The Essential Guide To Telecommunications
The Essential Guide To Telecommunications
“Dodd’s The Essential Guide to Telecommunications provides the history and context that make a
fundamental underpinning of modern business more accessible to technologists and businesspeople
alike. This new edition of her primer is an essential reference in the continuously evolving communica-
tions landscape.”
—Tom Hopcroft, President and CEO,
Mass Technology Leadership Council
“Annabel Dodd’s book is a clear guide and big-picture view of technologies and industries. It is an
up-to-date guide for anyone who wants to be familiar with important innovations and key technologies.
This is truly an industry bible for mobile, Internet, and networking services.”
—Hiawatha Bray, Technology Reporter,
The Boston Globe
“Ms. Dodd’s aptly titled The Essential Guide to Telecommunications has been my bible for all things
telecom since my days as an AT&T transmission network engineer nearly twenty years ago. Exhaus-
tively and meticulously researched, concisely written for lay folks and techs/engineers alike, this book
aids me in my current role as an IT Support Technician II when discussing new technology with our
telecommunications department. Thank you to Ms. Dodd for keeping us all current!”
—Todd Garbarini, IT Support Technician II
Commvault Systems, Inc.
“The Essential Guide to Telecommunications is probably one of the most useful and well-written books
on our telecom bookshelf. Annabel Z. Dodd does a great job of capturing a snapshot of the current
telecom industry. Even those with little or no technical training should be able to understand the text.
This is the perfect book for salespeople who want to learn more about the products and services they are
selling, or for those who just want to keep up to date on the latest in telecom technology.”
—William Van Hefner, President,
Vantek Communications, Inc.
“Ms. Dodd continues to provide an excellent and thorough text on the telecommunications industry. As
in her previous editions, she presents a good balance of technical and business-related information that
is readily understandable by anyone with an interest in this key component of today’s business environ-
ment. In her new edition, she has captured many of the recent changes in this dynamic field, which will
affect every company in the years ahead. I strongly recommend her book to anyone who wants a better
understanding of telecommunications.”
—Joe McGrath, VP, Sage Pharmaceuticals, Inc.
“Annabel Dodd has a unique knack for explaining complex technologies in understandable ways. This
latest revision of her book covers the rapid changes in the fields of broadband, cellular, and streaming
technologies; newly developing 5G networks; and the constant changes happening in both wired and
wireless networks. She also explains the consolidation going on in the industry, the impacts of social
media, and software control and virtualization of provider networks. This book is a must-read for any-
one wanting to understand the rapidly evolving world of telecommunications in the 21st century!”
—David Mash, Retired Senior Vice President for
Innovation, Strategy, and Technology
at Berklee College of Music
The
Essential
Guide to
Telecommunications
Sixth Edition
Annabel Z. Dodd
The author and publisher have taken care in the preparation of this book, but make no expressed or implied warranty of
any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential
damages in connection with or arising out of the use of the information or programs contained herein.
For information about buying this title in bulk quantities, or for special sales opportunities (which may include
electronic versions; custom cover designs; and content particular to your business, training goals, marketing focus, or
branding interests), please contact our corporate sales department at [email protected] or (800) 382-3419.
For questions about sales outside the U.S., please contact [email protected].
All rights reserved. This publication is protected by copyright, and permission must be obtained from the publisher
prior to any prohibited reproduction, storage in a retrieval system, or transmission in any form or by any means,
electronic, mechanical, photocopying, recording, or likewise. For information regarding permissions, request forms,
and the appropriate contacts within the Pearson Education Global Rights & Permissions Department, please visit
www.pearson.com/permissions/.
ISBN-13: 978-0-13-450679-1
ISBN-10: 0-13-450679-0
2 20
Preface xvii
Acknowledgments xxi
About the Author xxiii
Part I
Fundamentals, Data Centers, and IP PBXs 1
vii
viii Contents
Part II
Industry Overview and Regulations 123
Part III
Managing Broadband Networks and Broadband
Network Services 169
Part IV
The Internet and Cellular Networks 269
Glossary 389
Index 415
Preface
xvii
xviii Preface
And AT&T and Verizon are building large fiber networks and cellular infrastruc-
ture to carry new generations of mobile networks. T-Mobile and Sprint are building out
their cellular networks as well.
However, the number of choices consumers and enterprise customers have for
their Internet access and broadband services as well as their mobile services has
decreased and will shrink more if T-Mobile is granted permission to acquire Sprint’s
cellular network. If the Sprint acquisition is approved, the number of mobile operators
for nationwide coverage will shrink from four to three. This is a significant change, one
that may lead to higher prices for the students and young people that flock to T-Mobile
for its low prices.
New 5th generation mobile networks promise to support higher data rates than
ever before. However, these upgrades are costly, and require thousands of additional
cell sites and antennas, particularly in downtown urban areas with large amounts of
foot traffic. Mobile providers are additionally upgrading current 4th generation cellular
networks. Both of these efforts will support higher speeds, some up to a gigabit per
second. As capacity on mobile networks increases, they will support streaming video
and, in some cases, broadband links to residential subscribers’ homes.
Because of the greater capacity in mobile networks, many young people and stu-
dents depend wholly on mobile networks for messaging, streaming, and social network
access. Teens and twenty-somethings for the most part use Snapchat and Instagram
(part of Facebook) social networks rather than Facebook and Twitter. Snapchat is
newer, launched in 2011, and appeals to young people for its more visual service where
users upload videos and photos, rather than biographies and other written material as
on Facebook and other social networks.
Streaming services were first envisioned by Reed Hastings, the CEO and founder
of Netflix. Netflix initially mailed DVDs to subscribers in iconic red envelops and
stated at the time that Netflix would stream TV shows and movies when Wi-Fi became
robust enough to support video traffic. Netflix is a disruptive service that changed
user behavior and disrupted traditional sales of DVDs and movie theaters. Streaming
caused Blockbuster, the largest seller of DVDs, which had outlets on every corner, to
go out of business and movie theaters had to close many of their theaters due to fewer
people going to movies. Netflix is now an international business with service in nearly
200 countries.
A core strategy of Netflix, Hulu, Amazon, and their competitors is to attract sub-
scribers by offering popular TV shows and movies. Netflix was initially able to license
the TV series and movies it offered from content providers such as Disney, Time War-
ner, and Universal Studios. As these companies started offering their own streaming
services or were bought by larger companies, for example, AT&T and Comcast, less
content became available for competing streaming providers. As a result, Netflix,
Amazon, and others have poured billions of dollars into creating original content to
attract subscribers. Content is a critical factor in people’s decision to either drop cable
TV or subscribe to smaller cable TV packages.
Preface xix
Software is the driving force in managing today’s broadband and LAN (local area
networks) networks. Broadband networks controlled by software are referred to as wide
area software defined networks (W-SDNs). SDNs are also implemented in enterprise
networks. Both implementations are controlled from central terminals programmed
with commands that direct traffic to avoid routes with outages and congestion. Soft-
ware is used to manage complex high-capacity broadband networks. Functions previ-
ously installed on proprietary hardware can be abstracted in non-proprietary hardware.
These network functions include routers, servers dedicated to security, and gateways
that translate between networks that use different protocols. Another way that networks
are enabled to carry more traffic is the network equipment connected to fiber-optic
cabling that enables gigabit and even terabit data rates. A terabit is equal to a thousand
gigabits.
Networks that connect people have made the world smaller and opened up com-
munications worldwide. However, the common protocols used on the Internet where
everyone is connected to everyone else means that networks are inherently open to
hackers who use these common protocols as a way to hack into organizations’ networks.
Organizations large and small have experienced security breaches. Some breaches
have resulted in the loss of millions of peoples’ private information including their
social security numbers. In addition, security breaches have cost enterprises millions
of dollars in bad publicity and stolen intellectual property. To avoid major hacking
attacks, enterprises hire outside consultants, and strengthen their security staff. They
also educate users to the danger of opening attachments from people they don’t know.
These phishing emails contain malware able to contaminate entire networks. However,
there is no 100 percent guarantee that any of these steps will protect an organization
from a determined hacker. But organizations with strong security recover faster, and
detect attacks more quickly.
T hank you to all of the many people that took the time to share important informa-
tion about technology and government regulations. Staffs at the FCC and the Massa-
chusetts Department of Telecommunications and Cable provided clear explanations of
national and state regulations. Marketing Consultant David Gitner was a terrific source
of information on storage systems. Geoff Bennett, Director, Solutions and Technology
at Infinera, provided clear information about fiber-optic multiplexers, and Mike Quan,
cofounder of Boston 360, illuminated information about virtual reality. James Chap-
man, Senior Product Manager at Ipswich, spoke with me about network management
systems. Bob Xavier, Director, Systems and Networks at Berklee College of Music,
gave me a tour of Berklee’s IT department and discussed the issues involved in manag-
ing merging IT systems when colleges merge.
As always, Carly Premo Mello, IT Director, and Jamie V. Schiavone, Network
Manager for Framingham, Massachusetts, discussed the challenges of managing secu-
rity and storage networks. Joe Mulvey, IT director for Newton, Massachusetts, and
his staff spent time discussing their broadband, Wi-Fi, and IT structures and gave me
a tour of their data center. Mark Roberts, the Chief Marketing Officer at the former
Shortel (now Mitel), discussed specialty applications using VoIP technology. All of
these people provided insights into real-world issues.
Thank you also to Fernando Mousinho, Cisco Systems Director of Product Man-
agement for Endpoints, for his lucid explanation of Cisco Systems’ office products
and video conferencing services. Many thanks to Dave Parks, former Director of
Segment Marketing at Ciena Corporation, for his generosity in providing information
on Ciena’s broadband hardware and software. Dave has been an enormous source of
information for earlier editions of my book as well as for this sixth edition as has Joe
McGrath, VP of Information Technologies, Sage Therapeutics. Thanks to Kevin Klett,
VP of Product Management & Marketing at 128 Technology for his lucid explanations
of their stateful routing software.
xxi
xxii Acknowledgments
Thanks to Rick Swiderski, VP and General Manager at NEP Group, for his
informative discussions of the challenges facing rural telephone companies. His first-
hand knowledge was tremendously helpful. Thanks also to Kurt Raaflaub, head of strate-
gic solutions marketing at ADTRAN. Kurt and his staff provided important information
on the use of copper cabling connections to fiber cabling to bring high-speed broadband
to rural areas. Glenn Axelrod of Axelrod Broadcast Solutions illuminated the details
behind multiplexing technologies used in cable TV networks. Sal Tuzzeo at Nielsen dis-
cussed consumer trends in viewing television. Thanks as well to Joanta Stanke, Research
Director at Point Topic Ltd,, for her information and graphic on Internet access patterns
worldwide. Special appreciation to Mohammad Zulqarnain, Distinguished Architect of
Global Solutions at Verizon Communications. Mohammad illuminated the important
features and advantages of software defined networks. He further provided examples of
how enterprises and branch offices are deploying the technology.
A special thank you to Tom Case, Chief Information Officer for the town of Lex-
ington Massachusetts, who met with me and discussed the day-to-day issues involved
in designing and maintaining municipal networks. A thank you also to Donna Drudik
and Jim Thompson, California 911 Telecommunications Engineers, for discussing the
importance and time criticality for handling calls to 911 emergency centers. Jim also
provided information on technologies used for deploying emergency telecommunica-
tions services for handling text messages, mobile, and landline calls at emergency
call centers. Thanks to Ben, vice president of security for a major financial company.
Ben illuminated the challenges and technologies deployed to protect enterprises from
hackers. And appreciation to Keith Wise for valuable assistance with the Study Guide.
And finally, thank you to the many people I spoke with that preferred to not have
their names used. I appreciate the information each of you shared. Most importantly,
thank you to my husband Bob Dodd who read everything I wrote multiple times
and provided common sense advice on how to improve sections to clarify important
concepts.
About the Author
Annabel Z. Dodd is on the faculty at Northeastern University’s
School of Professional Studies, where she teaches courses on
data networks in the Master’s Degree Program in Informatics.
In addition to her university teaching, Annabel presents seminars
to organizations worldwide. Her webinar on LTE Essentials for
USTelecom attracted over 900 people.
Annabel has been an adjunct professor in the Master of
Science in Technology Management program at the State
University of New York at Stony Brook, where she taught in
a joint program with The Institute of Industrial Policy Stud-
ies, Seoul, South Korea. In addition, the Fundación Innovación
Photo courtesy of Annabel Z. Dodd Bankinter selected her to participate in their Future Trends
Forum in Madrid in 2004, 2005, and 2007. Formerly in mar-
keting at New England Telephone (now Verizon Communications) and Telecommunications
Manager at Dennison Manufacturing Company (now Avery Dennison), Dodd was honored by
the Massachusetts Network Communications Council as Professor of the Year. The Essential
Guide to Telecommunications has been translated into nine languages since its first edition,
which was published in 1997.
xxiii
This page intentionally left blank
Part I
Fundamentals,
Data Centers, and IP PBXs
Chapter 1 Computing and Enabling Technologies
Chapter 2 Data Centers and LANs, Storage, and IP Private Branch Exchanges
1
This page intentionally left blank
1 Computing and
Enabling Technologies
In this chapter:
Fiber-Optic and Copper Cabling 5
Chips—Building Blocks of the Digital Age 21
Packetized Data 23
Deep Packet Inspection: Monitoring, Prioritizing, and Censoring Traffic 26
Compression 30
Increasing Network Capacity via Multiplexing 37
Using Protocols to Establish a Common Set of Rules 40
Protocols and Layers 41
Virtualization: Space, Cost, and Maintenance Efficiencies 42
Managing Virtualization 44
The Cloud: Applications and Development at Providers’ Data Centers 47
Summary 62
Appendix 63
3
4 1 Computing and Enabling Technologies
C apabilities discussed in this chapter are the basis of important technologies used by
residential and business customers on a daily basis. They enable:
High-powered computer chips are the building blocks of innovation in the twenty-
first century. Their increased memory, speed, and 8-core processing capabilities along
with smaller size have made possible innovative technologies affecting industry, per-
sonal productivity, and connectivity. Decreases in chip sizes enable people to carry
computers in the form of smartphones in their pockets. Computing power, previously
only available in personal computers and large centralized computer servers, is now
used in smartphones and tablet computers.
For the most part, these electronics and networks have been available for most of
the twenty-first century. However, innovations in the speed, capacity, and amount of
memory on computer chips have resulted in higher capacity fiber-optic networks and
denser storage systems.
High-capacity virtualized servers that store multiple operating systems and
applications in a single device in less space, as well as high-capacity broadband
networks, are the basis of highly reliable cloud computing. Moreover, fiber networks
link cloud data centers together so that if one data center fails, another one automati-
cally takes over.
In an effort to more flexibly store applications, cloud companies and large enter-
prises use containers. Like virtual servers, containers don’t require that each applica-
tion be held in its own dedicated physical server. Containers break applications into
multiple parts so that each part can be modified without changing an entire application.
With virtualized servers, entire applications need to be rewritten for every change. The
software running containers is usually open source, free software. The hardware is
often lower-cost commodity servers.
The growth in capacity and reduced price of broadband networks have made
access to images, music, television series, and movies available to millions of people
via broadband networks powered by innovations in computer chips, multiplexing, and
compression. The images and videos are stored and accessed from high-capacity com-
puters. The computers, often located in the cloud, hold movies and TV shows offered
by services such as Netflix and Hulu.
Computing and enabling technologies have spurred the increased use of cloud com-
puting and streaming movies. Cloud computing has now evolved to a point where many
companies and individuals use it, but there are nevertheless challenges for large organiza-
tions that use cloud computing. IT staff need skills suited to monitoring and transmitting
Fiber-Optic and Copper Cabling 5
applications to the cloud and making sure that applications previously accessed from
onsite data centers are compatible with each cloud provider’s infrastructure.
Another enhancement enabled by increased speed and memory in chips is machine
learning. Machine learning is the ability of chips with powerful memories to “recog-
nize” patterns of images and changes in order to “learn” how to perform particular
tasks. For example, machines can learn to recognize clues in medical images to diag-
nose medical conditions that previously required skilled physicians to analyze.
For the most part, the technologies and protocols discussed here are not new.
Rather, they are more powerful and many of them have been refined to support addi-
tional applications. This is the case with the growing use and availability of cloud
computing and fiber-optic networks by all segments of developed nations.
fiber-optic cabling is not limited to these networks. It is also growing in cellular net-
works that use fiber-optic cabling to carry data- and video-heavy smartphone traffic
between antennas and mobile providers’ data centers in mobile networks. Fiber net-
works also carry traffic from cellular networks to the Internet.
Cloud computing is the main reason for the growing demand for capacity on fiber
networks. Most students, residential customers, corporations and governments use
cloud computing to access some or all of their applications. Fiber-optic networks con-
nect much of the world to applications located in the cloud. Demand for capacity on
networks is expected to continue growing as more organizations, developing coun-
tries, individuals, and governments use cloud-based applications and stream movies
and television shows.
In an interview, Geoff Bennett, Director of Solutions and Technology at the fiber-
optic networking company Infinera, stated:
Nothing else has the transmission capacity of optical fiber, and that’s
why fiber powers the Internet. There is no technology on the horizon that
could replace it.
a natural disaster such as a hurricane. Fiber links importantly enable cloud-based data
centers to continuously back up their entire sites in real time to ensure that customer
data is not lost during a disaster or malfunctions. The duplicate data center may be
hundreds of miles away or nearby within the same city.
Each data center that is linked to another data center and to subscribers has redun-
dant fiber cabling connected to their facilities so that if one group of fiber cables is
damaged or cut, the other is still intact. For example, one bundle of fibers may be
located on the eastern side of their building and another on the western side. Duplicate
power sources are also installed at these data centers.
Cloud Xpress 2
1RU
12 x 100GbE 1.2Tb/s
500Gb/s
Cloud Xpress
LINE
ACT STATUS
CONTROL
MODULE
IN OUT
SERIAL
CX-100E-500-S5C2
OCG 5, 6, 13, or 14
S/N MA9015210005
L
DCN
A
USB 2RU
PEM FAN
L L
ACT DWDM
5 x 100GbE NANANANANA
PWR
FLT
LOS
A
NCT-2
A
NCT-1
16 x 10GbE
Lasers—Lighting Fiber
Lasers (Light amplification by stimulated emission of radiation) are the source of light
on long-distance fiber networks and on fiber networks within cities. A laser turns light
pulses on and off over fiber cables. Most outside fiber-optic cabling is connected to
lasers for generating their light pulses. Due to improvements in manufacturing and
chips, lasers are so small that they are now available as computer chips integrated into
line cards connected to fiber-optic cables.
Dark Fiber
Because of the high cost of laying fiber underground and digging trenches, organiza-
tions that build new fiber optic networks often lay more fiber than they need when
they build the original network. They don’t add fiber multiplexers or lasers needed to
“light” the fiber on the extra fiber pairs. This fiber that does not have multiplexers or
lasers connected to it is referred to as dark fiber. It has not been “lit” with equipment
such as lasers needed to operate the fiber. See Figure 1-2 for an example of dark fiber.
xers
administration multiple
length division
ns e wave
with de
Lit fiber
For example, a university in the Northeastern United States installed two fiber runs
to a hosting center where many of their computer servers were located. They added
dense wavelength division multiplexing (DWDM) to one fiber run, and left the second
one as an alternate route to their hosting center, to be used in the event of a cable cut
in the main fiber pairs.
fiber strand as they travel. These zigzag paths also cause the signals to attenuate, lose
power, and fade over shorter distances. The narrow core results in a narrower angle of
acceptance. The small angle of acceptance of single-mode fiber keeps the light signal
from bouncing across the diameter of the fiber’s core. Thus, the straighter light signal
travels faster and has less attenuation than if it had a bouncier ride through the core.
When the light pulses travel in narrower paths, fewer amplifiers are needed to
boost the signal. Single-mode fiber can be run for 49 to 74 miles without amplification
(boosting). In contrast, signals on copper cabling need to be amplified after approxi-
mately 1.5 miles. For this reason, telephone companies originally used fiber for outside
plant cabling with cable runs longer than 1.2 miles. However, the demand for higher
capacity and the lower maintenance costs have resulted in carriers running increasing
amounts of fiber cabling directly to homes and buildings.
The main factor in the increased expense of single-mode fiber is the higher cost to
manufacture more exact connectors for patch panels and other devices. The core is so
small that connections and splices require much more precision than does multi-mode
fiber. If the connections on single-mode fiber do not match cores exactly, the light will
not be transmitted from one fiber to another. It will leak or disperse out the end of the
fiber core at the splice.
Multi-mode fiber has a wider core than single-mode fiber. The wider core means
that signals can only travel a short distance before they require amplification. In addi-
tion, fewer channels can be carried per fiber pair when it is multiplexed because the
signals disperse, spreading more across the fiber core. Multi-mode fiber is used mainly
for LAN backbones between campus buildings and between floors of buildings.
Another factor in the expense of installing fiber cabling systems is the cost of con-
nector standardization. Three of the main connector types are the Straight Tip (ST), the
MT-RJ, and the Little Connector (LC). Each type of connector requires specialized tools
for installation, and both factory- and field-testing. Technicians perform field-testing
prior to installation to ensure that the connectors meet factory specifications. It’s critical
that connectors match up exactly to the fiber so that signals don’t leak. If the connectors
don’t exactly match up to the fiber, signal loss impairs the fiber’s performance.
Fiber-optic cabling fiber itself requires more care in handling and installation than
copper. For example, it is less flexible than copper and cannot be bent around tight
corners. However, given its greater capacity and cost savings in ongoing maintenance,
developers install fiber between floors in large office buildings and between buildings
in office complexes. See Figure 1-3 for an example of fiber-optic cabling in enter-
prises. The fiber-optic cabling within commercial organizations is for the most part
multi-mode rather than single-mode because of multi-mode’s less stringent installation
requirements. Moreover, multi-mode capacity is adequate for commercial buildings’
bandwidth requirements.
There are two reasons why fiber is typically more expensive than copper to install:
The multiplexers and interfaces between fiber-optic cabling and copper cabling
in the customer’s facility require local power. This adds a point of vulnerability in the
event of a power outage.
Fiber-optic cable is made of ultra-pure strands of glass. The narrower the core
that carries the signals, the faster and farther a light signal can travel without errors or
the need for repeaters. The cladding surrounding the core keeps the light contained to
16 1 Computing and Enabling Technologies
prevent the light signal from dispersing, that is, spreading over time, with wavelengths
reaching their destination at different times. Finally, there is a coating that protects the
fiber from environmental hazards such as rain, dust, scratches, and snow.
An important benefit of fiber-optic cabling is that eavesdropping is more difficult
because the strands have to be physically broken and listening devices spliced into the break.
A splice is a connection between cables. Splices in fiber-optic cables are easily detected.
UTP copper and fiber-optic cables are the most common media used in enter-
prise LANs. Because of improvements in the speeds, capacity, and distances wireless
signals can be transmitted, wireless media is replacing copper cabling in some office
buildings. Wireless services based on the 802.11 (Wi-Fi) protocols are discussed in
Chapter 7, “Mobile and Wi-Fi Networks.”
Characteristics of media have a direct bearing on the distance, speed, and accuracy
at which traffic can be carried. For example, thin copper wire carries data shorter dis-
tances at lower speeds than thicker, higher-quality copper.
In corporate networks, UTP is the most prevalent medium used to link comput-
ers, printers, and servers to wiring closets on the same floor. This is referred to as the
horizontal plant.
Fiber is capable of carrying vastly more traffic than copper. However, it is more
expensive to install and connect to devices in LANs than UTP, and thus it is generally
used in high-traffic connections between the following:
• Wiring closets
• Floors (the risers)
• Buildings on campuses
The key characteristic that makes fiber suitable for these high-traffic areas is that
it’s a non-electric medium. Fiber exhibits superior performance because, unlike cop-
per, it does not transmit electric signals that act like an antenna and pick up noise and
interference from nearby electrical devices.
• LEDs cost less than lasers. They are commonly used with multi-mode fiber.
• Lasers provide more power. Thus, less regeneration (amplification) is needed
over long distances.
• At the receiving end, the light detector transducers (receivers) that change
light pulses into electrical signals are either positive intrinsic negatives
(PINs) or avalanche photodiodes (APDs).
• LEDs and PINs are used in applications with lower bandwidth and shorter
distance requirements.
18 1 Computing and Enabling Technologies
Floor 2
Floor 1
Standards also specify the network interface card (NIC) in printers and computers
from which a cable connects the device to the jack (outlet). The Telecommunications
Industry Association (TIA) rates twisted-pair cabling and connection components used
inside buildings.
Figure 1-6 The Nvidia Integra Xi chip is about the size of a thumbnail. It
was the first chip Nvidia used for self-driving car technology development.
(Image courtesy of Nvidia)
22 1 Computing and Enabling Technologies
Machine Learning
Memory and processing power in chips enable machine learning and in the future will
enable artificial intelligence. Although the terms are often used interchangeably, there
is a difference between machine learning and artificial intelligence. Machine learning
uses microchips to compare stored images to new images to detect anomalies and pat-
terns of data. It can be thought of as computerized pattern detection in existing data
and identification of similar patterns in future data. Microchips compare billions of
images and phrases and words to find anomalies and to perform tasks formerly done
by people.
For example, graphic processing units (GPUs) chips are able to process and
store complex mathematical algorithms that represent images. Google is training its
machine learning system to recognize a picture with a car in it. The machine learning
system is shown a large number of pictures with a car in it. Telling the system if there
is a car in the picture or not enables the computer to later recognize the visual qualities
associated with cars. Machine learning is also used in facial recognition software used
by police departments.
Artificial intelligence solves problems by using reasoning, logical deduction,
searching, and trial and error. Artificial intelligence has the ability to imitate a human
brain’s functions. Although media articles claim that certain applications and cloud
computing services use artificial intelligence, they are actually powered by machine
learning. Artificial intelligence applications that mimic human intelligence are not cur-
rently available.
The following are examples of machine learning:
Machine learning enabled by powerful chips already has a major impact on work and
job efficiency. Machine learning will continue to affect jobs that involve repetitive
tasks and those needing stored information to make decisions.
Packet 1
Pack
Packet 1
et 3
Figure 1-7 Three of the packets of an e-mail from John to Sophie take
different paths through the network.
Overhead
Figure 1-8 User data vs. overhead addressing and end-of-packet bits in
packets.
Throughput
Throughput is the amount of user information transmitted, not the actual speed of the
line. The disadvantage of frequent error messages and other protocol-related bits is that
overhead bits often consume large amounts of bandwidth. Throughput only measures
actual user data transmitted over a fixed period of time. It does not include header bits.
Protocols with many bits for error control messages and other types of overhead have
lower throughput. Technologies such as Deep Packet Inspection and Traffic Shaping
are used to mitigate the effect of delays associated with these protocols. (See the sec-
tion “Traffic Shaping,” later in this chapter, for more information.)
only a packet’s address is analogous to looking at the address of an envelope. DPI pro-
vides the capability to determine which application the packet is using by examining
patterns within packets. It can distinguish Voice over Internet Protocol (VoIP) traffic
from data, gaming, and video traffic. Carriers use traffic shaping to prioritize particular
types of traffic.
Giving certain types of traffic priority over other types is referred to as traffic shap-
ing. Traffic shaping can be used to prioritize and deny access to the network by types
of traffic, e.g. music vs. data or video, and traffic from particular organizations. Traf-
fic from healthcare providers or companies that pay extra fees might be given higher
priorities than other traffic.
DPI software develops a database of patterns, also referred to as signatures. Each
signature or pattern is associated with a particular application such as peer-to-peer
music sharing or protocols such as VoIP. It can also be associated with traffic from
certain hackers or even terrorists attempting to launch malicious attacks with a goal of
disrupting Internet or government sites. The DPI software matches its own database of
patterns found in packets to those associated with particular applications, and network
attacks.
DPI software can be installed in stand-alone switches connected to an ISP or car-
rier’s network or as part of routers or firewalls. Routers are used to connect traffic to
the Internet as well as to select routes to other networks. Firewalls are hardware or
software that is designed to protect networks from hackers by looking for and blocking
unusual header information and known viruses and to detect outgoing messages with
confidential and private information.
COMPRESSION .......................................................
Compression is a technology that reduces the size of video, data, image, and voice files
so that they require less space in networks and on hard drives in computers. Compres-
sion has the same effect as a trash compactor that reduces the amount of space trash
consumes. Compression shrinks the size of files without materially changing images
or text. The benefit of compression is that it dramatically decreases the amount of net-
work capacity (bandwidth) needed to transmit high definition TV, music, and movies.
Compression additionally facilitates the ability of companies to store video files,
and large databases can use less disc space on computer storage systems. The ability
to store more information using less computer capacity has led to companies, govern-
ments, social networks, and marketing organizations storing petabytes of data.
Additionally, compression has drastically changed the entertainment business,
sports viewing, online games, and has led to the formation of new business models
including streaming media companies, specialty set-top boxes such as Apple TV and
Roku, and video productions of online video ads.
Compression increases throughput, the amount of user data or video transmitted,
without changing the actual bandwidth (capacity) of the line. In other words, it takes
fewer bits to transmit a movie, but the bandwidth of the network is the same. A given
amount of bandwidth is able to transmit more user information, TV, audio, and video,
with fewer bits.
At the receiving end compressed files are de-compressed, re-created, in the exact
images as before they were transmitted or at a slightly lower quality. Text is re-created
exactly as it was before it was compressed so that numeric information or product
information is not altered. However, when it’s received, compression might re-create
video and voice in varying degrees of lower video resolution or voice quality with
acceptable, often barely noticeable, alterations. Certain critical files such as MRI and
x-ray images are decompressed without losing any quality.
There are a number of standardized compression algorithms (mathematical for-
mulas used to perform operations such as compression) that enable compressed text
and video to be transmitted in a format that can be easily decompressed at the receiving
end. The following is a list of commonly used compression protocols:
• Various MPEG standards are used to compress and decompress audio and
video. MPEG stands for Moving Picture Experts Group.
• MPEG-4 is a standard used mainly for streaming and downloading com-
pressed video and television.
• AAC Advanced Audio Coding is Apple’s proprietary compression used in
iTunes and Apple Music. It is part of the MPEG-4 standard.
• Most Windows-based personal computers store and transmit files using
WinZip compression. It is available for MAC computers as well. It can com-
press a group of files into one “package.”
See Table 1-4 in the “Appendix” section at the end of this chapter for a more com-
plete listing of compression standards.
Streaming and downloading music has caused the music industry and artists’ royal-
ties to shrink considerably. Customers now buy their music primarily from online sources
such as iTunes and listen to songs on their smartphones. This has caused sales of CDs
to shrink because people want to buy just a favorite song from particular artists. They
often choose not to buy a CD because they may like only one or two of the songs. Illegal
free music downloads are still occurring from sites such as LiveWire.com. According to
Hannah Karp’s March 30, 2017, article “In a First, Streaming Generated the Bulk of
Annual Music Sales” in the Wall Street Journal, in 2016 streaming music made up 51 per-
cent of the total music revenue in the United States. This was the first time that streaming
sales accounted for the majority of music revenue compared to CDs and music downloads.
The combination of free downloads and the drastic decreases in CD sales have
resulted in lower royalties to musicians. Popular singers now depend on concert sales
for the majority of their income because for the most part, young people simply buy
individual songs online. Or they stream music and don’t own copies of all the songs to
which they listen.
that files are stored at the same quality as the original image. Another feature of FLIF
is that it is progressive. As images are downloaded, a preview appears so that people
see a preview of the image before it is fully downloaded. Because it is lossless, FLIF is
suitable for all types of images including MRIs, photographs, and art. FLIF is available
without cost or royalties under GNU General Public License.
GFWX, Good, Fast Wavelet Codec, was developed by Graham Fyffe at the Uni-
versity of Southern California to store large amounts of video. It encodes and decodes
videos faster than earlier compression standards. It can store videos in lossy and loss-
less formats. With lossy formats, bits deemed non-essential are eliminated when the
video is stored. Images on DVDs are stored in lossy formats.
V-NOVA’s PERSEUS compression software is based on the premise that there is
a lot of spare digital processing capacity in the multiprocessing chips that process the
complex mathematical algorithms that are the basis of this compression. PERSEUS
compression is encoded in parallel rather than in sequential, serial lines of code. The
complex mathematical algorithms coded in hierarchical, parallel streams take advan-
tage of the multiprocessing capabilities in digital devices such as set-top boxes, video
games, mobile devices, computers, and storage systems where processors can simulta-
neously process complex mathematical algorithms encoded in parallel streams.
According to V-NOVA’s co-founder Guido Meardi, the fact that compression
enormously shrinks the number of bits needed to transmit data will enable mobile net-
works to carry vast amounts of video and rich media applications. This is particularly
important in countries with older cellular networks not built to transmit bandwidth-
heavy video and medical images. Compression that vastly shrinks the number of bits
required for medical imaging could bring telemedicine to people in countries with
predominantly older cellular networks. V-NOVA’s compression is being deployed in
Nepal where doctors collaborate over their older cellular network with radiologists in
New York City on interpretation of MRIs and x-rays.
Compression Applications
people watching movies and sporting events are actually at the event rather than watch-
ing from a remote location. They are virtually experiencing it. For example, the experi-
ence of watching someone climb a mountain via VR can give the viewer a sense of the
peril and freezing temperature experienced by the climber. As a result of this immersive
experience, virtual reality movies that depict assaults on people or scenes of destruction
caused by war or natural disasters may create empathy for people viewing these videos.
Virtual reality (VR) is a technique for capturing immersive images and videos. For
example, people can see the cruise ship or resort in VR to help select a vacation venue.
Images captured in virtual reality formats have far greater detail than available on tradi-
tional photos and videos. The viewing angle is also larger, and not limited to just a TV
screen.
Rather, the video image appears to be all around viewers. High-quality cameras and
viewing devices are needed to view, transmit, and decode 100- or 120-degree images.
Special software can also be used to “stitch” a few cameras together to create wide vir-
tual reality images. In the future, social networks might allow people to upload posts in
virtual reality formats.
According to Mike Quan, Co-Founder of Boston-based Boston 360:
Social media has connected us. Virtual reality provides people the
opportunity to experience another person’s life, almost to see it through
someone else’s eyes. It’s the ultimate telepresence.
bits need to be transmitted to create virtual reality images. Samsung, Facebook’s Oculus
Rift, Sony, Dell, Leap Motion, and Google manufacture virtual reality headsets. See
Figure 1-9 for an Oculus Headset.
Open Source software developer Unity provides a 3-D software tool for creating
virtual reality applications that a majority of the about 2 million virtual-reality develop-
ers use to develop virtual reality applications. In addition, Google, Facebook, Apple, and
Amazon are developing virtual reality capabilities for their smartphones and web sites.
The most commonly used virtual reality applications are video games. Additional
applications under development or in use include:
• Live televised sports events that people with headsets and compatible smart-
phones can view. VR provides 360-degree views of sporting events from all
angles: front, sides, and back.
• Training professional athletes with simulation of tactics.
• Real estate applications where prospective buyers see homes for sale without
actually having to travel to each home.
• A remodeling virtual reality application being tested by Loews that enables
customers to envision how remodeling projects will look.
• Social network posts that enable people to connect with each other in a more
personal way using posts in virtual reality formats to share experiences and
feelings.
• Medical training that involves virtual reality videos for operating nurses and
anatomy courses where students use VR to learn anatomy and gain “first-
hand” knowledge of steps in medical procedures.
• Drones with high-quality cameras that capture images on the ground in vir-
tual reality format.
Increasing Network Capacity via Multiplexing 37
Augmented Reality
Augmented reality, on the other hand, adds pictures of animated characters or other
images to what users see when they look around them. Augmented reality requires spe-
cialized apps on smart phones, but not always specialized headsets or headsets resem-
bling eyeglasses. The mobile game Pokémon Go, which was released in 2016, is an
example of the use of augmented reality (AR). Pokémon Go, a joint effort of Niantic
Labs, Nintendo, and Pokémon Company as reported in the July 12, 2016, Wall Street
Journal article, “What is really behind the Pokémon Go Craze,” by July of 2016, was
the most profitable game on Google and Apple’s app stores up until that time.
Augmented reality needs smartphones’ cameras, GPS, and position sensors. Posi-
tion sensors rely on accelerometers within smartphones. All new smartphones are
equipped with accelerometers able to detect how users tilt their smartphones. For exam-
ple, are they tilting them sideways or straight up? Accelerometers enable smartphone
viewers to modify the angle at which they view images.
Augmented reality is used in manufacturing and product assembly. In one example,
workers wear special glasses such as Google Glasses that flash images of instructions
and diagrams sent from computers to the glasses with directions for the next steps in
processes. In this way, workers don’t have to interrupt their work to read instructions.
Like compression, companies and carriers use multiplexing to send more informa-
tion on wireless airwaves, fiber networks, and internal Local Area Networks (LANs).
However, unlike compression, multiplexing does not alter the actual data sent. Rather,
the multiplexer at the transmitting end combines messages from multiple devices and
sends them on the same wire, wireless, or fiber medium to their destination, whereupon
a matching device distributes them locally.
One important goal is to make more efficient use of the most expensive portion of a
carrier’s network so that the carrier can handle the vast amounts of traffic generated by
devices such as smartphones and computers. Multiplexing is also used by enterprises
that link offices together or access the Internet by using only one circuit (a path between
sites) rather than paying to lease multiple circuits from their provider. The two most
commonly used types of multiplexing are time division and statistical.
Time-Division Multiplexing
Time-Division Multiplexing (TDM) is a digital multiplexing scheme that saves capacity
for each device or voice conversation. Once a connection is established, capacity is saved
even when the device is idle. For example, if a call is put on hold, no other device can
use this spare capacity. Small slices of silence in thousands of calls in progress result in
high amounts of unused network capacity. This is the reason TDM is being replaced in
high-traffic portions of networks by VoIP technologies, in which voice packets are inter-
spersed with data and video traffic more efficiently, without wasting capacity. Thus,
network capacity is not wasted during pauses in voice or data traffic.
Statistical multiplexers support more devices and traffic than TDMs because they
don’t need to save capacity when a device is not active. Carriers sell WAN Internet
access via carrier Gigabit Ethernet offerings, supporting a range of speeds from 10Mbps
to 100Gbps. If there is a surge in traffic, such as during peak times, the carrier can tem-
porarily slow down traffic. However, because Gigabit Ethernet’s statistical multiplexing
has the capability to prioritize traffic, customers who contract for more costly, high-
priority service can obtain higher capacity than customers with lower-priority service
during traffic spikes.
Other types of multiplexing in addition to statistical multiplexing include dense
wavelength division, a form of frequency division multiplexing which divides traffic
among frequencies in fiber-optic networks to increase the fibers’ capacity. Dense wave-
length division multiplexing is discussed in the section below on fiber optical cabling.
Bits organized into groups of 8 bits are bytes. Each byte can be a letter character,
punctuation, or a space. Computer hard-drive capacity is measured in bytes, but
speeds on digital lines are measured in bits transmitted per second. Bytes stored
on computer drives and large servers are stored in digital form.
To summarize, a byte is a character made up of 8 bits. A bit is an on or off
electrical or light pulse.
40 1 Computing and Enabling Technologies
users browse the Internet and access information through web interfaces at
enterprises. They are good examples of overhead bits.
• Hypertext Transfer Protocol Secure (HTTPS) This is a protocol used
to transfer data over the Internet and other networks in a secure fashion by
encrypting data. It provides protection from hackers. It can authenticate
(verify) that the network connected to is not spoofed, meaning it is the
network that it purports to be and that another network has not intercepted a
communication intended for a different site.
• Extensible Markup Language (XML) This is another markup language
based on elements surrounded by tags that identify fields requiring user
input. The tag <name> is an example of a tagged label; it is not visible to
users. Other variable labels might include quantity, address, age, and so on.
Firms can analyze responses provided by visitors to a site who fill out online
surveys. Tagged responses can be sorted by fields such as geography or age.
XML enables computers to automatically process responses collected online
or in specialized applications such as purchasing and ordering functions in
businesses. The protocol-related tags and labels identifying fields in XML
create the many extra overhead bits transmitted along with documents con-
taining XML commands.
• Simple Object Access Protocol (SOAP) This enables communications
between programs on different operating systems such as Windows and
Linux by specifying how to encode, for example, an HTTP (Hypertext
Transfer Protocol) header and an XML file. It eliminates the requirement to
modify infrastructures to process HTTP and other communication transport
protocols on networks.
Knowing the capabilities in each layer helps in understanding the protocol and
equipment capabilities being described.
S
Servers are computers used for specialized tasks such as managing docu-
ment traffic to printers and storing applications.
m
Without server virtualization, each server in a data center would support only a
single operating system. Virtualization enables each server to run multiple operating
systems, with each operating system running multiple applications. Each operating
Virtualization: Space, Cost, and Maintenance Efficiencies 43
system running multiple applications is a virtual machine. This reduction in the num-
ber of servers required to support vast numbers of applications made virtualization a
key building block for cloud computing.
Technical advances have enabled virtualization to make it possible for large enter-
prises and cloud computing providers to consolidate servers. Supporting more than
one operating system on a single physical server requires large amounts of processing
power. However, with the development of powerful multi-core processors, parallel-
computing streams can perform multiple computer instructions simultaneously.
Virtualization host operating software from companies such as VMware, Inc.
(VMware was developed by EMC, which is now owned by Dell) and Microsoft allocate
and manage computer resources such as memory, hard-disk capacity, and computer
processing between the operating systems and applications on a server. Virtualization
management software simplifies data center operations by providing the ability to allo-
cate more resources in a data center from a single interface.
Server sprawl can be a problem when many applications are replicated on diverse
servers. It is often a challenge to manage the large number of virtual machines located
within a data center.
Large cloud providers commonly have multiple data centers that contain replicated
copies of all data. If a data center becomes disabled, another can easily take over its
functions. Virtualization makes it less costly and complex for providers to support mul-
tiple data centers in different physical locations. This results in a reduction of physical
services, less electrical power, and less cooling, thus lowering providers’ energy costs.
Moreover, virtualization enables data centers to support multiple developers by
providing a virtual computing platform for each developer while he is logged on to a
virtual machine. Multi-core processors enable multiple developers to simultaneously
log on to the same physical server. When a developer logs off from his area of the
server, computing power is freed up for other uses.
Because of security and privacy concerns, large companies often do not want their
applications and files on the same physical servers as those of other organizations. In
these instances, they can elect to reserve a group of servers for their own use. Amazon
refers to this feature as a Virtual Private Cloud. Other providers offer similar features.
Not surprisingly, there is an extra monthly fee associated with this service.
MANAGING VIRTUALIZATION.................................
Organizations can realize many benefits by implementing virtualization capability in
servers and storage networks. They also take on challenges managing them in complex
environments.
In addition, disk storage is being used up at a faster rate. Users now routinely store
MP3 files in their e-mail inboxes. In data centers where user files and e-mail messages
are archived, this can deplete spare storage in Storage Area Networks (SANs) at a
faster rate than planned. Thus, storage, memory, and processing requirements should
be monitored. In large, complex data centers, it can sometimes be easier to monitor and
manage single physical servers rather than virtual machines and storage.
In small organizations, managing memory, storage, and CPU usage is not as com-
plex. With only three or four physical servers, it’s not as difficult to track and manage
resource allocation.
Server Sprawl
Server sprawl is the unchecked proliferation of virtual machines on physical host serv-
ers. (Virtual machines are also referred to as images.) Managing server sprawl in large
data centers is a major challenge. Because it’s easy to install multiple images of appli-
cations on virtualized servers, the number of applications can escalate rapidly. Data
centers that previously had 1,000 servers with 1,000 applications can potentially now
have 8 images per physical server and 8,000 applications to manage.
Another cause of server sprawl occurs when an application is upgraded. To test
the application before it’s upgraded, management creates an image of the application,
upgrades the image, and then tests the upgrade on a small group of users before mak-
ing the upgrade available to all users. However, often the original and the upgraded
application are left on the physical server, which further contributes to sprawl. To com-
plicate matters further, if either the original or the upgraded version is moved to a
different physical server, it can be difficult to determine that there is a duplicate. Con-
tainers, which are discussed below, are also vulnerable to sprawl.
Docker engine
Hypervisor
Host hardware
Host hardware
Containers are used to hold small, related programs that are referred to as micro
services. For example, Netflix and LinkedIn might use containers to differentiate and
manage each of the many services they offer customers without having to change pro-
gramming for other services. This is efficient when organizations need to modify just
part of their offerings. With containers, programmers don’t need to alter their entire
application, just a particular piece of it: a micro service. For this reason, applications
in containers are less complex to modify. Thus, if there’s a change in one service, pro-
grammers need only modify that particular micro service.
Container applications are installed on bare metal servers, which have only a sin-
gle operating system. Many containers are installed on cloud platforms such as those
provided by Amazon and Rackspace. Private equity firm Apollo Global Management
LLC owns Rackspace.
Each container is located on a private server dedicated to a single organization.
Multiple customers do not share containers in the cloud. This is an advantage for cus-
tomers who want to be assured that the total capacity of the server is reserved for their
applications. They are isolated from traffic, also referred to as noise, from other cus-
tomers’ traffic, which may use much of the physical server’s resources.
Applications on containers located in the cloud or in large data centers are accessed
via application program interfaces (APIs), small programs that translate between pro-
grams in the containers and those in the data center from which staff access the pro-
grams in the container. APIs are used by both developers and end-users. Accessing an
application is referred to as pulling an image (an application) down.
Seattle data center Chicago data center New York City data center
Servers
Servers
Fiber-Optical Cabling
Three distributed cloud data centers connected together with fiber-optic
cabling.
Switches at each data center transmit back up data to the others so data is
not lost in the event of a failure
Organizations now have choices about where applications are located. They can
place applications at:
• A hosting center where companies often place their own computers and
manage them remotely. The hosting company is responsible for:
− Security
− Broadband links to the hosting site
− Sustainability in the event of power outages and natural disasters.
• Purchasing rights to software with installation at their own data centers
• On the cloud where a provider manages the hardware and the application
software
When cloud computing was first introduced, it was wildly popular with small start-
ups that wanted to avoid investing in computer hardware because of growth uncertain-
ties. However, larger businesses were more cautious about moving applications to the
The Cloud: Applications and Development at Providers’ Data Centers 49
cloud because of concerns about privacy, security, and loss of control over applica-
tions. Cloud computing is now widely recognized by organizations of all sizes as a
legitimate way of managing and developing applications. However, there are still con-
cerns over security. There are additionally challenges involved in moving applications
to the cloud and controlling runaway usage costs associated with the cloud.
might be too sophisticated for its changing needs. It is also useful in supporting IT in
acquired companies and gearing up for spikes in usage.
The cloud is additionally a way for concerns, particularly start-ups, to develop and
test applications before making them available to staff or customers. The following is
an example of how a new company used cloud computing to test the viability of their
planned applications. The start-up rented 50 client computers and one server with four
application programs and one database machine from Amazon for 0.50¢ an hour to
test their application without having to invest in hardware. Without the ability to test
applications on Amazon, their start-up costs would have been prohibitive because they
would have had to lease 50 computers plus 1 for a database.
Large enterprises were initially interested in cloud computing because there was a
perception that it would be less costly than hiring additional staff as well as purchasing
and supporting hardware and software for new applications. With cloud computing
there is no capital investment. Companies pay usage per person, in a similar manner
to renting a car.
Cost savings are not always the main advantage or impetus for using cloud com-
puting. While capital and staff expense are lower with cloud computing, monthly
usage costs can balance out these savings so that businesses don’t spend less money on
overall IT services. Usage fees from employees’ extra computing and data access can
eliminate expected savings as employees use more computing resources than initially
envisioned.
Both large and small organizations look to cloud computing to maximize their
attention and assets on core missions. They may consider some IT applications to be
utilities better managed by IT experts at cloud companies. For example, they may use
Microsoft Azure’s cloud-based Office applications for word processing, collaboration,
presentations and spreadsheets to avoid managing and upgrading these applications.
With Office in the cloud, upgrade responsibilities are taken care of at Microsoft’s data
centers.
An important advantage of cloud computing is the speed at which new applica-
tions can be implemented in the cloud. This can equate to competitive advantages.
For example, customer service or sales applications can increase sales revenue. Faster
access to company analytical data about sales and customers are other examples of
how the speed of developing applications can help businesses grow or retain current
customers. In fact, while saving money may be the initial motivation, it is often not
the key advantage of using cloud computing. Agility in business operations, the abil-
ity to launch strategic applications, and the ability to scale and shrink as required are
stronger motivations for using the cloud. The following is a quote from an IT Director
in the Boston area:
We ordered Oracle one day and the next day it was launched in the
cloud. Without the cloud it would have taken three months and additional
staff time. When we purchase new software, we always look for applica-
tions that are cloud ready.
The Cloud: Applications and Development at Providers’ Data Centers 51
SaaS
Software as a Service is the most frequently used cloud service. Organizations that
want to avoid the staff time needed to develop, test, and roll out new applications often
use Software as a Service. With SaaS, new applications can be implemented more
quickly than if the customer implemented them on their own servers. They can turn to
developers to write them or simply use existing cloud-based applications.
Customers are attracted to Software as a Service because the cloud provider
manages applications, the operating systems on which applications are installed,
the virtualization in the server, servers, storage, and broadband connections
between users and the applications. The customer’s responsibility is porting appli-
cations to the cloud, and monitoring the billing and usage. Many SaaS provid-
ers offer applications, such as Salesforce.com and NetSuite, used by business and
commercial organizations.
Salesforce.com offers its customer relationship management (CRM) services
for managing relationships concerning customers and sales prospects. Its software
can be used to automate writing sales proposals. It also profiles and targets custom-
ers based on these profiles. NetSuite, owned by Oracle, offers businesses an end-
to-end software suite that includes CRM, inventory, and e-commerce applications
that integrate web sales with back-office functions such as billing and accounts
receivable.
52 1 Computing and Enabling Technologies
Young people and adults as well use SaaS applications in their personal lives. For
example, students in particular back up their music on sites such as iTunes. The follow-
ing is a quote from a Chinese exchange student in the Boston area:
Services for residential customers, such as the Office-like Google Docs suite, the
document-sharing service DropBox, the backup service Carbonite, and social media
sites LinkedIn and Facebook are examples of Software as a Service.
M
Middleware is a piece of software used between application programs and
other software such as database managers. It is used to mediate the dif-
o
fe
ferences between operating systems and applications so that they operate
together. It essentially mediates the differences between pieces of soft-
ware. In cloud computing, middleware mediates the differences between
onsite software being moved to the cloud and the computing environment
at the cloud provider’s data center.
and the Internet. When transmitting applications over broadband links to the cloud,
companies often protect these transmissions from eavesdroppers and interception by
creating Virtual Private Networks (VPNs). The VPN creates a secure link between the
cloud and the customer by encrypting the data and providing a way to securely decrypt
(re-create) the data at the receiving end.
Encryption is the process of using a mathematical formula to reorder bits so that
they are unrecognizable to equipment that doesn’t have the “key” to decrypt the data
into readable data. The VPN also ensures that the data exchanged is formatted so that
it is not blocked by firewalls at either end. A firewall is a software application that all
incoming transmissions must pass through. Firewalls are programmed to accept only
certain transmissions and to block known viruses. The software used to spin applica-
tions to the cloud makes the addressing formats compatible between the cloud’s infra-
structure and the customer’s data center, and vice versa.
Another complication of spinning applications to the cloud is that many users
access applications from mobile devices. Companies have to figure out how to get
applications to them when they’re not sitting at their desk. Two issues are that the
mobile user may be accessing an application from a location with poor mobile cover-
age and from a device with a small screen that makes it difficult to actually view the
data easily.
Moving applications from data centers to the cloud can involve rewriting them or
changing internal processes. For example, operating systems and addressing schemes
used by a particular cloud provider might be different from those utilized by its cus-
tomer. Addressing schemes can include formats such as IP addresses assigned to data-
bases and applications, and Media Access Control (MAC) addresses for individual
computers. In addition, compatibility between the two infrastructures is important,
because applications that reside on a provider’s infrastructure interface might not be
compatible with its customers’ databases.
addresses for individual computers. Without changes, some applications might not be
compatible with hardware located in a provider’s data centers. Software, transparent
to customers and cloud providers is required to create compatibility between operating
systems, hardware, and applications.
A common practice is for customers to program their applications using a stack
of open source LAMP programs (Linux, Apache, MySql, PHP), packages located, for
example, on Amazon. Stacks are programs that work together. Linux is an operating
system, Apache is an HTTP program for transferring data, PHP is a programming lan-
guage. Perl and Python are also used instead of PHP. LAMP programs may be grouped
together in container servers.
Moving applications from data centers to the cloud can involve rewriting them or
changing internal processes. In addition, compatibility between the two infrastructures
is important, because applications that reside on a provider’s infrastructure interface
might not be compatible with its customers’ databases.
APIs, (Application Programming Interfaces) transparent to customers and cloud
providers, create compatibility between operating systems, hardware, and applica-
tions. This enables different software programs to communicate with each other. Most
companies use APIs to spin applications to the cloud.
Some applications are not architected for the cloud. Standard web browser inter-
faces are used with APIs to access cloud-based applications. Before applications are
spun up to the cloud, organizations test access to them with multiple web browsers
to make sure they will be compatible with all staff even when staff are traveling or
accessing them from home computers where a variety of browsers might be installed.
If organizations want something more sophisticated than a web user interface, they
might bring them in-house rather than putting them in the cloud.
• Monitoring costs
− Are costs increasing in line with business growth?
− If not, what is causing the increase?
− Are particular staff or departments using an unnecessary amount of
computer resources?
• Tracking congestion on broadband links connected to the cloud
− Is higher capacity needed?
− Is there too much capacity?
58 1 Computing and Enabling Technologies
be able to add to reports fairly easily, having staff from other organizations access this
information on the cloud complicates security because of log-on and authentication
requirements.
Because of security concerns, collaboration on product development between
multiple companies is a challenge when using the cloud. Because businesses are
worried about security, they build all kinds of barriers around accessing this data. So
organizations that need to collaborate with other companies may keep some applica-
tions in-house so they can control access more easily when collaborating with other
organizations.
The European Union and the United States Department of Commerce came to a
new EU–U.S. agreement in 2016 on updating privacy regulations to protect European
data. The agreement, called the Privacy Shield, took effect on August 1, 2016. Its
requirements are more stringent than those in the Safe Harbor agreement. However,
many experts expect even these regulations to be challenged in court.
In addition, some U.S. companies are slow to update their privacy clauses to
comply with the new regulations. Some of this slowness is because of the uncer-
tainty about the Privacy Shield. There are concerns that the EU Court of Justice
will overturn it as not being strict enough. Other organizations see adherence to the
Privacy Shield stipulations as a competitive edge in competing for business in the
European Union.
At any rate, a new set of privacy regulations, the General Data Protection Regula-
tion, took effect in May 2018. It includes a “right to be forgotten” provision that states
that people’s personal data should be deleted when citizens request the right to be
forgotten.
Cloud computing advantages include faster time to market that enables companies
to implement new, strategic applications in less time with fewer staff. However, staffs
and consultants with different skills from those required to manage in-house applica-
tions are required to move applications to the cloud. This can be an issue where there
is a shortage of employees with these skills. Moreover, total cost of running IT ser-
vices may not be lowered by using the cloud because of usage fees that often increase
over time.
Major implication of using cloud computing is the fact that local area networks
within buildings and broadband networks carry an exponentially increasing amount of
traffic. Moreover, these networks are more critical than ever as many computing func-
tions are not possible without broadband and in-house network links. Thus, it behooves
companies to have network backup plans and redundancy in the event of failures in
their networks.
SUMMARY ..............................................................
The rapid pace of innovation and technological advancements is powered by computer
chips that are faster and smaller and have increased memory and processing power.
Chips are the engines in personal and business computers and all electronic devices
including wristwatches, headsets, printers, fitness gear, televisions, set-top boxes, ther-
mostats, and newer vending machines. Much of this gear is connected to broadband
networks.
Broadband networks transmit data, voice, and video over high-capacity fiber-optic
cabling. Dense wavelength division multiplexers, with powerful chips, connected to
fiber in broadband networks enable broadband networks to carry many more streams
of traffic simultaneously. The small chips within multiplexers take up less space, but
enable transmissions from multiple devices to be carried simultaneously on single
strands of fiber cables.
Compression and multiplexing gear are key elements in advanced gigabit per sec-
ond packet networks connected to homes, commercial organizations, and businesses.
Compression is an important technology that uses advanced mathematical algorithms
to shrink the number of bits needed to transmit high-definition video, music, text mes-
sages, and voice. The most widely used cloud applications enabled by compression
and multiplexing are the social networks whose subscribers upload and stream music,
video clips, and photos to and from Facebook, Snapchat, Spotify, LinkedIn, and oth-
ers. Amazon’s cloud computing, streaming media, and retail sales is another factor in
increased traffic on broadband networks.
Compression, multiplexing, high capacity networks and computer chips addition-
ally enable cloud computing. Cloud computing has a large impact not only on how IT
Appendix 63
APPENDIX ..............................................................
• Greater capacity The ability to mix voice, video, photographs, and e-mail
on the same transmission enables networks to transmit more data.
• Higher speeds It is faster to re-create binary digital ones and zeros than
more complex analog wavelengths.
• Clearer video and audio In contrast to analog service, noise is clearly
different from on and off bits, and therefore can be eliminated rather than
boosted along with the signal.
• Fewer errors Digital bits are less complex to re-create than analog signals.
• More reliability Less equipment is required to boost signals that travel
longer distances without weakening. Thus, there is less equipment to
maintain.
64 1 Computing and Enabling Technologies
In this chapter:
Introduction 68
What Is a LAN? 69
Switches, Media, and Protocols in LANs 70
IP PBXs—Voice, Video, and Unified Communications 99
IP Telephony—Converting Voice Signals to Digital Data 101
Unified Communications, Contact Centers, and Video Conferencing 107
Appendix 118
67
68 2 Data Centers and LANs, Storage, and IP Private Branch Exchanges
INTRODUCTION .....................................................
IT management is in a race to keep up with growing demand for capacity on local area
networks (LANs) and storage systems. The growth in the amount of traffic on LANs
that results in congestion is due to the growing number of employees
The above factors add to the increasing volume of data traversing the LANs.
In addition to more voice, data, and video transmitted on LANs, there are require-
ments for additional capacity on storage systems. Some of the needs for additional
storage can be attributed to the fact that regulations in certain industries require busi-
nesses to save data for 3 or more years. Examples of industries with retention require-
ments include
Even organizations without as many requirements to retain data are finding it nec-
essary to add more storage space for data related to customer information, product
specifications, research projects, and employee data. In addition, the cost for storage is
decreasing, which allows organizations to store more data.
Data centers are centralized locations for housing software applications. Because
of the growing dependence on the cloud to store and manage applications, enterprise
data centers are shrinking in physical size. Placing applications in the cloud takes the
burden of monitoring, patching, and upgrading applications away from staff in corpo-
rate data centers. It additionally reduces the load on organizations to have mechanisms
to protect applications from power outages, brief power interruptions, and natural
disasters such as hurricanes and tornadoes.
What Is a LAN? 69
Cloud services allow small companies to operate without a data center, and most
of the medium-sized companies only require two or three servers. For small and large
organizations alike, cloud services provide many of the management tasks previously
performed by in-house technical staff. However, even with cloud services, IT staff is
needed to monitor security and secure access to applications in the cloud.
Employees often bring expectations for capacity, accessibility, and user-friendly
interfaces from their experience as residential customers. Residential customers can
easily access Facebook, Snapchat, and Google from mobile devices and laptops.
Employees expect the same level of service for work-related computing tasks. They
anticipate the applications they access to be always available, easy to use, and acces-
sible from mobile devices and remote locations. This is an ongoing challenge for IT
personnel and management.
Organizations are meeting these staff expectations through unified communica-
tions, collaboration software, and easy-to-access desktop video conferencing. Unified
communications is the ability to access company directories and voice mail messages
from within a single e-mail inbox. Collaboration software, which mimics Google Docs
and Box services, enables employees to share documents, edit documents written by
other staff, and keep up-to-date on group projects. Telephone system manufacturers
such as Mitel and Cisco often include these applications and capabilities in their sys-
tems’ platforms.
To meet staff expectations for access to applications, organizations are taking steps
to prevent delays and ensure continuous uptime. They are investing in higher capacity
switches to transmit growth in LAN traffic, and LAN monitoring software to quickly
spot and resolve equipment and software glitches.
Copper, Wi-Fi, and fiber media tie nodes and switches together into a network.
Switches, Media, and Protocols in LANs 71
Backbone switches connect to other switches; not to Redundant fiber optical cabling
end-users’ devices.
Data center
Switches in wiring closets connect to other switches
and to end-users’ devices.
Data center
• Purchase of a separate, duplicate switch that can take over if one fails.
• Installation of redundant power supplies in the switch. (A power supply
converts AC power to the low-voltage DC power required by computers.)
Switches are inoperable if the power supply fails.
• Installation of redundant blades in the switch. Each blade (also referred
to as a card or circuit board) supports a megabit or gigabit capacity
Ethernet port.
E
Examples of media are: copper, fiber-optic cabling, and wireless on cellular
and Wi-Fi networks. Copper is used most often between individual wired
a
ccomputers and the wiring closet on each floor. Fiber is often used to trans-
mit data between floors and within the data center to transport the heavy
concentrations of traffic. Because of its light weight and large capacity, fiber
is deployed where there is the heaviest amount of traffic. See Chapter 1 for
a discussion of fiber and copper cabling. Copper cabling is used most often
to connect nodes to LANs. (The term devices are used synonymously with
nodes.) Wireless of course is used for Wi-Fi. See the section on Wi-Fi in
Chapter 7, “Mobile and Wi-Fi Networks.”
“We never have enough capacity on our local network or storage space
in our storage area network.”
Switches, Media, and Protocols in LANs 77
F
Frames serve the same function as packets. They surround user data
with addressing, error checking, and other protocol-related bits. The term
w
““frame” is used in lower-level protocols, such as Ethernet, which is used
for communicating within LANs connected to the same switch in the wiring
closet. Packets refer to data configured for transmission between LANs and
on the Internet by using TCP/IP.
78 2 Data Centers and LANs, Storage, and IP Private Branch Exchanges
times. The endpoints do not need to send data back to a central point for instructions
because they are automatically sent to the endpoints whenever there are changes in
policies. Thus, LANs can respond dynamically in real time, to changing traffic pat-
terns, congestion, and outages. For example, if one route is congested or out of service,
data is automatically transmitted on other routes.
Flexibility
Changes can be implemented rapidly because many changes in software-defined net-
works do not require additional hardware. Changes are made by programming new
policies in central controllers. Changes should of course be tested in isolated parts of
the network or data centers before they are implemented. See Chapter 4, “Managing
Broadband Networks,” for software-defined network technologies on broadband links.
Switches
Raised floor for electrical wiring, water pipes that carry water for air
conditioning, and protection from water damage.
Often an organization will consolidate applications that are not in the cloud into
central data centers that were previously located in numerous remote offices and
department. Centralization and streamlined data center operations are enabled in large
part by storage, server, and switch virtualization. Increased broadband network capac-
ity is another key enabler of centralized data centers.
WAN
Physical host
Physical host server with
servers virtual machines
Servers at
headquarters with
replication software
and virtual machines
SAN SAN
WAN = Wide Area Network
LAN = Local Area Network
SAN = Storage Area Network
An even more costly option is to lease or build a second, backup data center. The
backup may be at a providers’ site or may be owned and operated by the enterprise.
“The decline in costs of mass storage has greatly impacted our research
and development. We can purchase huge amounts of storage to help us
analyze how changing inputs to drugs during development results in
chemical changes.”
the data, and receiving the data—in other words, the movement of data between the
data storage network and the requesting or sending computer. Current storage systems
are capable of close to 1 million inputs–outputs per second. Each request for data uses
a protocol that issues a request and receives either an acknowledgment or a negative
acknowledgment if the request is refused. The transmission of the requested data is
also referred to as the time in flight.
Storage Components
All storage systems are made up of servers with specialized programs to manage and
monitor the memory in disk drives and flash memory. The programs on servers also
handle access to storage. Newer storage systems are composed of standard off-the-shelf
computers. Storage systems additionally require fiber-optic cabling links between the
storage area network and LANs and broadband networks. Traffic on the links may be
routed via specialized protocols.
Spinning disc
containing data
Another option in addition to spinning discs is to use flash memory. Flash memory
consists of interconnected flash memory chips in which data is stored. Flash memory
has the advantages of being faster to access and requiring less electricity. However,
after a finite amount of times that data is “written” onto flash memory, it will physically
wear out. Some storage systems contain both types of memory and others consist of all
flash memory. Kaminario, EMC’s DSSD, and Quorum are examples of companies that
offer storage systems made entirely of flash memory. Infinidat offers a hybrid system
with flash memory for the most frequently accessed data and spinning discs for the rest
of the data. NetApp sells both hybrid and all-flash storage.
There is disagreement in the industry over which approach, flash memory vs. spin-
ning disks, is best. Often flash memory is used for data that is accessed more frequently
and spinning disks for archived and less frequently requested data.
Flash storage
Spinning disc
storage
The Fibre Channel group of SAN open protocols was designed for the heavy traf-
fic generated in data-intensive networks. It is a point-to-point protocol, wherein data
is transferred directly from one point (a computer) to another point (disk storage).
Because of its capability to transfer large amounts of data at high speeds, large compa-
nies use Fibre Channel. It is the costliest SAN option.
The Fibre Channel over Ethernet (FCoE) protocol was approved by ANSI in 2009.
It was developed so that Fibre Channel SANs could communicate with Gbps Ethernet
networks without translating between Ethernet and Fibre Channel protocols. The goal
is to simplify structures and communications in data centers.
Other, less costly, SANs include:
Hyper-Converged Infrastructure
Hyper-converged infrastructure (HCI) in data centers simplifies data center infrastruc-
ture and provides the ability to manage storage, computing, development and testing,
remote offices, and other services from a single point by combining storage, applica-
tions, and networking on commodity, off-the shelf appliances. HCI is available from
most equipment manufacturers. If not using off the shelf servers, HCI requires that all
the data center hardware be from the same manufacturer.
HCI is software-controlled infrastructure. Centralized software is used to manage
the entire HCI infrastructure and prioritize streams of data. The software application
(the controller) monitors and controls the data center and creates logs of traffic, and
outages. The error reporting software is centralized.
The goal of hyper converged infrastructure is to provide enterprises a way to scale
up or down without a major forklift. HCI came into prominence as a way to save money
by emulating cloud infrastructure in private and commercial companies. Compression
and deduplication are used in storage equipment so that data can be stored using less
disk space. Compression uses complex algorithms to shrink the size of data. See Chap-
ter 1 for more about compression. Deduplication removes redundant data from stored
and transmitted files. Additionally, it streamlines protocols that require acknowledg-
ments and negative acknowledgments after each stream of data transmitted.
databases
When a user turns on his screen, he sees an image of his desktop, complete with
icons. Virtual Desktop Integration is referred to as thin-client technology because very
little intelligence is needed at the end user’s device. The user’s equipment is referred
to as the client. Organizations such as Dell, Citrix Systems, Inc., LISTEQ, Microsoft,
Nimboxx, Oracle, and VMware supply desktop virtualization software.
In the past, when Virtual Desktop Integration was tested, most organizations that
installed it experienced unacceptable delays in accessing centralized files and appli-
cations because of inadequate LAN capacity. Improvements in LAN capacity have
eliminated these delays. Another factor inhibiting implementation is the fear that if
a remote user wants to work on centralized files, and she is somewhere without an
available broadband connection, productivity gains in centralizing applications and
any modifications to the files will be lost.
are considered Layer 3 devices. Routers are critical. If they fail, all access to the Inter-
net and other sites is lost. Because of this criticality, organizations typically purchase
backup routers. They can balance the traffic between the two routers or keep a backup
router on hand, which can be installed quickly in the event of a primary-device failure.
The devices that connect internal networks to a carrier’s public networks are con-
sidered edge devices. Routers are defined as edge devices because they connect sites
to the Internet via dedicated links, such as Carrier Gigabit Ethernet service. For more
on Carrier Gigabit Ethernet, see Chapter 5, “Broadband Network Services.” In cellular
networks, cell phones and smartphones are edge devices that connect users to either
the Internet or other mobile devices.
These services are located on specialized circuit boards, or blades, within the
router. Multiple services can be located on the same blade, which can have more than
one processor.
B
Blade servers hold blades that are arranged vertically and housed in racks
in data centers. In contrast to horizontal circuit boards, vertical arrange-
ments such as this conserve space and can share power supplies, fans,
m
and cabling, thus consuming less energy. In addition, applications can be
added or removed without taking the server out of service.
For example, Berklee and the Boston Conservatory had incompatible student
systems. Berklee had a student system called Colleague, and the Conservatory had
PowerCampus Student. Student systems are software packages used to manage the
majority of tasks around students. These include admissions, financial aid records,
human resources, tuition bills, and course registrations.
According to IT director Bob Xavier, the number one priority for Berklee is the
ability to be nimble so that the University can keep up with technological changes and
requirements. Four years before the merger, the Boston Conservatory made a strategic
decision to push all applications and processes to the cloud or to hosting centers. They
wanted to “get out of the data center business.” The rationale is that it’s easier to be
nimble and flexible without the burden of upgrading hardware in data centers when
technology inevitably changes. Xavier is in the process of continuing the push to the
cloud for the combined entity.
Incompatibility between browsers, computers, and applications is another area
where the school is working toward standardization and compatibility. Not all of
cloud and hosted applications are compatible with every browser used at the school.
The university would like to see more standardization in browsers so that cloud and
hosted applications work more smoothly and can be tested with just a single browser.
In addition to these differences, some staff and faculty have PCs and others have Mac
computers.
Currently the IT department feels that none of the systems scale, adequately to
support both universities. They are not designed to be functioning globally, across time
zones. The university is now working to align all of these incompatibilities and limits.
Xavier predicts that this will be a 3-year process.
deploy monitoring software to alert them to outages and provide reports and charts on
the percentage of outages and congestion on, for example, switch ports and routers.
LAN monitoring software includes visual information on servers with web inter-
faces. Charts indicate the status of various devices so that IT staff can clear the problems
by having information on web-like browser interfaces indicating where the outages are
that affect each LAN segment. IT staff receive email, text, and audible alerts to notify
them that there are outages. LAN monitoring software can be installed on servers at
customer sites or in the cloud.
Cloud based and on-site monitoring packages are sold and maintained by the
software developer, resellers, and managed service providers. Developers of moni-
toring software include: Cisco, Hewlett Packard, ipswitch, NetBrain, PagerDuty,
PRTC-Paessler, and NagiosCore.
• Personal computers
• Printers
• Security monitors
• Switches
• Routers
• Storage devices
• Security monitors
• Servers
• Wi-Fi gear
While LAN monitoring software can be used for Wi-Fi gear, specialized Wi-Fi
monitoring software from Wi-Fi manufacturers can monitor these networks in more
detail. If Wi-Fi gear is included in non-specialized monitoring software, then compo-
nents of Wi-Fi networks need to be inventoried. In addition to inventorying each piece
of LAN hardware, monitoring software needs to be aware of which devices are con-
nected to each other. For example:
O
Organizations assign a private IP (Internet Protocol) address to each piece
of gear connected to their network. IP addressing is a protocol that speci-
o
fies the format of addresses on the Internet. Organizations use this num-
bering scheme for addressing specific devices on their LANs. The format
is a series of numbers: xxx.xxx.xxx.xx that indicate the part of the LAN and
the address of each device. When messages are addressed to external
locations, software within the LAN translates the private IP address to a
public IP address assigned to them by their carrier. Private IP addresses
are required because the amount of public IP addresses is limited and
because it would be almost impossible for the entire world to coordinate
the details of assignment of public IP addresses to individual components
of local area networks.
A
Almost all computers have ping software. Telephone companies’ and com-
puter companies’ technicians commonly ping the equipment at customers’
p
locations as a first step in determining if there is a problem in their remote
lo
equipment or, in the case of telephone companies, their outside network.
For example, when a customers place a service call to their telephone com-
pany or computer vender, the technician may say, “The problem must be in
your equipment because there is no problem in our network or equipment,”
or if there is no response to the ping the technician may say, “We see a
problem and will dispatch a technician.”
“Companies would rather not get any false readings from their monitor-
ing systems. But, if they do get a false reading, which happens from time
to time, they would rather get false positives than false negatives. With
a false negative, an outage is ignored and thus not resolved.”
98 2 Data Centers and LANs, Storage, and IP Private Branch Exchanges
basic software is configured, only new customer information needs to be entered into
the software. All customers have close to the same features, thereby simplifying the
set-up and the software.
In addition, LAN monitoring suppliers receive a continuous stream of income
from customers’ subscriptions. In contrast, with on-site sales, there is a one-time pay-
ment for the software and an approximate 12 percent of the purchase price annual
maintenance fee.
Cloud provider customers’ advantages are that they avoid a one-time purchase
price and the day-to-day maintenance of the software. Rather cloud providers’ custom-
ers pay monthly fees based on the size of their systems. Customers whose systems are
in the cloud are provided with a console with a browser interface so they are able to
receive indications of what’s up and what’s not and print charts and graphical summa-
ries of the status of their gear.
Monitoring software located in the cloud needs the capability to monitor diverse
customers located in different locations and distinguish, for example, Customer A from
Customer B. This capability is provided by multi-tenant software. Multi-tenant soft-
ware is able to organize the software by individual companies.
IP Telephony Manufacturers
Makers of voice telephone systems such as Avaya, Inc. and Mitel Networks Cor-
poration once dominated the market for telephone systems. However, the advent of
IP telephony, wherein voice and data are carried on the same network, presented an
opportunity to companies such as Cisco Systems and Microsoft that previously sold
only data equipment and software.
Microsoft’s VoIP product Microsoft Teams replaces Skype for Business. Teams
is a cloud based suite of applications such as voice, email, and collaboration between
staff. Teams also includes integration with Office 365, a package of software for spread
sheets, word processing and presentations. Microsoft has stated its intention to con-
tinue its Skype service for consumers and small businesses.
Manufacturers and software developers of IP-based telephone systems include the
following:
• QoS solutions These solutions mark and prioritize voice and are important
to ensure minimal delays for acceptable voice quality. See the upcoming sec-
tions “Assessing Network Quality by Using Voice Quality Measurements”
and “Prioritizing Voice and Video on a VLAN” for information about voice
quality measurements and Virtual LANs (VLANs).
• Compression Compressing and digitizing voice signals impacts quality.
For example, the compression algorithm, Adaptive Multi-Rate Wideband
(AMR-WB), based on the G.722.2 standard, is able to compress 16,000
samples of voice per second to rates as low as 12.65 kilobits per second.
At this rate, each voice session uses only 12.65KB of bandwidth, but
provides better audio than earlier compression standards, including G.711,
which required more capacity. G.722.2 provides high-definition (HD) voice
and is used for some mobile voice traffic.
In addition to the preceding, proxy servers authenticate callers to verify that they
are who they say they are before being sent to their destination. Proxy servers, located
in gateways and firewalls, serve as intermediaries between callers and applications or
endpoints, telephones, and other devices connected to the LAN.
• Packet loss This refers to the packets that are dropped when there is net-
work congestion. Packet loss results in uneven voice quality. Voice conversa-
tions “break up” when packet loss is too high.
• Latency This term refers to delays (in milliseconds) that are incurred when
voice packets traverse the network. Latency results in long pauses within
conversations, and clipped words.
• Jitter This refers to uneven latency and packet loss, which results in noisy
calls that contain pops and clicks or crackling sounds.
• Echo This is the annoying effect of hearing your voice repeated, an issue
with which so many of us are familiar. It is often caused when voice data is
translated from a circuit-switched format to the IP format. This is usually
corrected during installation by special echo-canceling software.
IP Telephony—Converting Voice Signals to Digital Data 103
• 802.1P protocols tag voice and multimedia packets to prioritize them for
improved availability with less delay. The tag distinguishes voice and video
packets. In addition to multimedia, tagging protocols such as 802.1P are
used for conferencing services, as well.
• VLANs shield endpoints from hackers by allowing only certain types of pack-
ets through firewalls to reach them. This is accomplished by means of policies
for firewall logical ports that are dedicated to voice and video traffic. Logical
firewall ports are defined in software rather than actual physical ports.
IP PBX Architecture
Private Branch Exchange (IP PBX) architecture varies somewhat among different
manufacturers, but the servers for call processing and gateway functionality are com-
mon to all. The gateway converts Voice over Internet Protocol (VoIP) signals to those
compatible with the Public Switched Telephone Network (PSTN). These are located in
a separate gateway or in a router. In addition, Layer 2 switches transmit calls to other
devices connected to the switch and backbone switches.
R
RJ45 is the designation for a type of jack into which data devices are
plugged to connect to networks.
p
104 2 Data Centers and LANs, Storage, and IP Private Branch Exchanges
For greater redundancy and to create a dedicated path to the Layer 2 switch, the
PC and telephone can each use a separate RJ45 jack, cabling, and port on the Layer 2
switch. This requires additional hardware in the switch and an extra cable run from
the telephone to the switch. In either case, voice, video, and data share the fiber-optic
cabling and ports on Layer 3 switches that transmit traffic between floors and build-
ings. This is the enterprise backbone.
busy signal, and ring-no-answer conditions. Media gateways transmit signals for VoIP
such as ringing, call setup, and touch-tone in separate channels from voice calls.
for gateways, and voice quality is impaired. The signal’s quality is impaired when
converting VoIP to formats compatible with SIP data networks when they are sent,
and converting them back to VoIP when they are received. Impairment results because
compression does not re-create voice in exactly the same format when it’s decom-
pressed, and vice versa. Thus, its quality is degraded every time voice data is converted.
VIDEO COLLABORATION
• Web-based interface to
video conference
application
• High-definition video
• Multiple simultaneous
Gwen Jack Andrew
participants
• Screen sharing to
Christine Jennifer
collaborate on documents
• Encryption &
authentication
• Equipment located in the
cloud
Using video conferencing capabilities such as this, co-workers with video cameras
on their devices can work together on a more personal level. Another advantage is
that staff members can take advantage of the same communications capability away
from the office as they do in their office. If WebRTC (Real Time Communications)
software is embedded in browsers, users with disparate PCs can participate in the same
videoconferences.
W
WebRTC is a set of IEEE and World Wide Web Consortium (W3C) protocols
for software-based codecs in applications and browsers. WebRTC enables
fo
real-time voice, video and chat among disparate devices and operating
re
systems.
so that people can coordinate dates for meetings. Collaboration applications are gener-
ally Internet-based. To improve security, some collaboration services encrypt texts so
that data remains private. They may also have strict password and log-on requirements.
One example of collaboration software is Cisco’s WebEx collaboration. WebEx
can be accessed from desktops, smartphones, and laptops or from specialized video
conferencing equipment for meetings. Its screen sharing enables staff to view the same
documents while on a videoconference or audio conference or one-to-one telephone
call. WebEx provides strong security features such as password management, encryp-
tion (the use of algorithms to scramble bits for added privacy and security), and role-
based access to limit or widen access to WebEx for designated groups of employees.
Many software collaboration tools include the option of purchasing a whiteboard so
that a group of remote staff can access documents and add written comments on the
white board.
HD video conferencing systems often are integrated with collaboration software.
They make it easier to integrate collaboration capabilities that include enabling people
in meetings at different locations to view and edit the same documents.
Collaboration sessions can be held in real time or people can log in at different
times to add comments, send text messages, coordinate calendars, or edit documents.
Other companies in addition to Cisco that provide collaboration software are Ama-
zon, Asana, Atlassian, Citrix, IBM, Google Drive, Masergy, Microsoft Teams, Oracle,
Slack, Trello, and Unify. There are many others, most of them free.
Video Conferencing
Because of the ready availability and consumers’ positive experiences with desktop
video conferencing services offered by Google, Amazon, and Skype, staff expect con-
ferencing to be readily available at work. When employees travel with laptops, smart-
phones, or tablet computers, they often take advantage of formerly residential video
offerings to stay in contact with colleagues and customers. These alternative ways
to conduct business with distant customers and offices have enhanced collaboration
between staff at diverse locations worldwide.
Microsoft Teams’ conferencing service and Cisco’s web-based WebEx audio and
video conferencing can be integrated with Microsoft Office 365 applications on users’
desktops.
document. Some of these services are Cisco’s WebEx, Citrix’s GoTo Meeting, West
Corporation’s Intercall, and PGI (Owned by Siris Capital Group).
add new features to their server without customers needing to call their supplier to
reprogram their server software.
Customers do have an administrative screen where they can add and delete staff
names and specify classes of service—restrictions on where staff can call or services
they have permission to access. Customers that use a hosted IP PBX service are con-
nected to their system via high-speed broadband connections. These network connec-
tions also transmit busy signals and ring tones between the provider and the customer’s
handset.
Hosted VoIP systems are attractive to smaller and medium-sized companies that
might not have in-house expertise to manage IP telephony and applications such as
collaboration, contact centers, or unified communications. These companies might
also be uncertain about their future growth. In addition, hosted systems provide disas-
ter recovery and portability. If the customer loses electricity or their LAN crashes, they
can access their telephony functions remotely.
Large companies with specialized needs, such as hospitals and financial organiza-
tions, may not choose to use a hosted solution, as it might not fit their special require-
ments for high-level security and privacy or other specialized features. Hosted systems
are designed to provide the same features to all customers. Most do encrypt broadband
data on the links between the host and the customer.
VoIP hosting providers include the manufacturers of IP PBXs listed above, as well
as telephone companies and cable providers such as AT&T, Verizon, and Comcast
Business.
and e-mail than there are people to always respond to them immediately. Importantly,
contact centers provide statistics on utilization of agents, telecommunications lines,
and numbers of e-mail, text, and chat sessions.
The main theory behind grouping agents into “pools” is that large groups of agents
can handle more calls than the same number of agents organized into small groups,
without overflow of calls between groups. This is analogous to the practice by the
United States Post Office of using one long line for postal clerks rather than an indi-
vidual line for each clerk. With one line for all postal workers, a clerk will be available
more quickly from the pool and the same number of clerks will help more people
within a given amount of time than by forming separate lines for each clerk.
Contact centers route incoming traffic to the agent that has been idle the longest
within the appropriate agent group, based on the telephone number dialed or by the
customer’s account or telephone number. If all agents are busy, the contact center
shunts the call to a queue, routes the call to an alternate group of agents, or gives the
caller the option to leave a voicemail message. Sophisticated call centers additionally
route calls to groups of multilingual staff or staff with knowledge about particular
products or technologies.
Callers to contact centers can recognize when they reach one if they hear a
message such as the following:
Please hold, and the next available agent will take your call.
Alternatively, organizations may move contact centers to parts of their own country
with lower salaries and office rents.
To respond to more customers without adding more staff in the existing center,
companies are deploying technologies such as automatic and written responses to
e-mail, speech recognition, web-based sales, online forums, and chats. The practice
of customers completing transactions without speaking with an agent is referred to as
self-service. Some companies operate their sales function almost entirely on the Web.
And, of course, Amazon built its entire business models around the Web.
Many of these web-based businesses are well regarded for their customer service,
even though they don’t actually involve any human contact. Moreover, many consum-
ers prefer self-service on the Web over listening to long, automated menus and waiting
in phone queues.
• Newspapers subscribers can use it to stop and start delivery before and after
vacations, or report missed delivery of newspapers.
• Airlines can link to flight information.
• Prescription drug benefit programs enable people to order drug refills.
Unified Communications, Contact Centers, and Video Conferencing 115
APPENDIX ..............................................................
Protocol, Service,
or Device Description
Blade server Blade servers are computers packaged on individual boards—
blades—that plug into slots in a chassis. A chassis is the metal frame
on which components fit, similar to a custom cabinet with slots for
specific items. In high density, chassis blades are arranged verti-
cally. In low density, three- or four-blade servers, they are arranged
horizontally. Chassis are placed on racks in data centers. Vertical
arrangements conserve space and can share power supplies, fans, and
cabling. In addition, blades can be easily added.
File server A specialized computer with a large hard drive. File servers provide
users with access to documents and applications in central locations
in LANs.
Load balancing The capability of equipment to balance traffic between networks and
devices so that one network or device is not overloaded while others
carry little or no traffic.
Local Area Network A group of devices such as computers, printers, and scanners that
(LAN) can communicate with one another within a limited geographic area,
such as a floor, department, or small cluster of buildings.
Layer 2 switch A switch located in a wiring closet that allows multiple simultane-
(also called a ous transmissions within a single LAN. Layer 2 switches provide a
switching hub) dedicated connection during an entire transmission.
Layer 3 switch A switch that routes traffic across the LAN backbone based on IP
(also known as a (network) addresses. They are more complex to manage than Layer
routing switch) 2 switches, but they can use alternate paths if one path is out of
service. They are located in data centers and link wiring closets and
buildings within a campus.
Layer 4 switch (also A switch located at hosting sites and corporate and government sites
known as a content that host their own web pages. Layer 4 switches connect web traffic
switch) to the desired web pages by looking at the URL, the web address
from which each packet was transferred to the site.
Router Routers carry traffic between LANs, from enterprises to the Inter-
net, and across the Internet. They are more complex than switches
because they have routing tables with addresses and perform other
functions. Routers select the best available path over which to send
data.
120 2 Data Centers and LANs, Storage, and IP Private Branch Exchanges
123
This page intentionally left blank
3 Competition, Industry Structures,
and Regulations
In this chapter:
Introduction 126
The 1984 Breakup of AT&T 128
Regulatory Issues 138
The State of the Industry—Consolidation via Mergers 149
Non-Traditional Competitors: Alphabet, Apple, Amazon,
Facebook, Twitter, Snapchat, and Microsoft 156
Appendix 168
125
126 3 Competition, Industry Structures, and Regulations
INTRODUCTION .....................................................
T he United States is fortunate to have high-capacity broadband networks throughout
most of the urban and suburban areas. These networks are capable of transmitting the
growing volumes of traffic generated by enterprises and residential customers. For the
most part, the wireline broadband and cellular networks are operated by large con-
glomerates with the resources to invest large amounts of capital in their networks.
Today’s broadband, cellular, and cable TV providers have nationwide networks
and very few competitors. This has contributed to the fact that broadband rates are
higher than those in almost all countries worldwide. There are two reasons for the
dearth of competition. It’s enormously costly to build network infrastructure and main-
tain these networks. In addition, large providers have purchased their competitors.
Because of the high infrastructure costs and marketing and advertising expenses, the
barriers to entry for new network providers are cost prohibitive. There are however,
resellers that lease network capacity at a discount and resell these services on the net-
works they lease.
Cable TV prices have risen in part as a result of the high costs borne by providers
for licensing movies, TV shows, and real-time sporting events. Providers have to bear
additional expenses if they are creating original movies and television series. Amazon,
Facebook, and Microsoft as well as AT&T and Verizon have built huge networks of
data centers to support the services they offer. They have each additionally purchased
many start-ups and small companies that have developed specialized software for
cloud services, advertising networks, mobile applications, and other offerings. These
subsidiaries have enabled these companies to offer a larger range of services. Cable TV
providers have also invested heavily in these services and have upgraded the broad-
band lines that connect to their subscribers.
The number of choices that subscribers have for broadband services will decrease
further under the AT&T and Time Warner merger. With the FCC’s approval of
the AT&T purchase of Time Warner, AT&T gained the large cache of content that
Time Warner owns including HBO, Turner classic movies, and CNN.
The same is true due to the purchase of 21st Century Fox by Disney. The Walt
Disney Co.’s purchase of 21st Century Fox has resulted in Disney’s acquisition of a
vast collection of movies. They were required to divest themselves of Fox’s regional
sports network. As a result of these mergers, less content is available to AT&T and
Disney’s competitors. In response, streaming companies are now forced to create more
of their own costly content. This may ultimately limit consumer choices for streaming
providers and make it difficult, if not impossible, for new companies to enter the field.
T-Mobile has offered to purchase Sprint. If the Sprint and T-Mobile merger is
approved, the number of mobile networks with nationwide reach will be reduced from
four to three. This will further reduce consumers’ choices and may result in higher
prices. T-Mobile in particular has offered service at prices lower than AT&T and Veri-
zon. They also were the first to offer unlimited cellular service packages. It’s possible
Introduction 127
that a combined T-Mobile and Sprint merger will mean higher prices. In addition, a
decrease in competition often results in less impetus to upgrade networks and offer
innovative services.
The proliferation of streaming has impacted how people get movies and TV shows
and caused cable TV operators to lose thousands of customers. It has additionally
resulted in changes in telecommunications, cellular, and cable TV companies’
strategies, which have all begun offering their own streaming services. In addition, a
large number of movie chains have closed theaters because rather than going out to
a movie theater, many people stay at home and watch streaming shows. Netflix is an
example of a company that has used streaming to disrupt an entire industry and change
the way people get entertainment.
Unfortunately, there have been negative impacts from the vast improvements in
technology and the openness of the Internet. Robocalls made by scammers use high-
speed automatic dialers programmed to call thousands of telephone numbers in a short
period of time. In addition to being annoying, criminals that initiate robocalls bilk
trusting people out of millions of dollars by promising them delivery of purchases and
services that don’t materialize.
Social networks have had many positive effects on teenagers and adults who enjoy
the ease of staying in touch and keeping up with distant relatives. However, bad actors
in these networks have taken advantage of the huge numbers of people on these social
networks to sway public opinion and publish false statements. Some have also cre-
ated millions of fake subscribers to these networks. Facebook is attempting to create
safeguards so that spam posts don’t happen in the future, but the damage has already
been done.
Millions of people have had their privacy stolen on Facebook by the sale of their
information without their consent. While there are laws protecting children’s privacy
in the United States, there are no laws that protect adults and teenagers. It’s not clear
that such laws will be enacted in the near future.
Although broadband networks have more capacity than ever before in urban areas,
in many rural areas, this is not the case. Many subscribers in rural areas have access to
networks that support only low-data rates. However, in some rural towns and agricul-
tural areas, this is starting to change. Government subsidies have enabled providers in
some rural locales to upgrade to higher capacity fiber optical networks.
However, federally funded Lifeline subsidies for low-income people that can’t
afford broadband are shrinking. Many people that live in poverty can’t afford the high
prices for broadband links that their children need to access their homework, which
is frequently posted online. In addition, adults can’t search or apply for jobs online
without broadband.
The consolidation in broadband, mobile providers, and social networks has led
to companies that have the resources to spend millions of dollars each year to lobby
Washington for favorable rules. Loose or favorable regulations impact many com-
panies. There may be no incentive to enforce privacy and strengthen the security of
data centers and cloud offerings. Regulations impact pricing, tax policies, and billing
128 3 Competition, Industry Structures, and Regulations
competitors such as the former MCI (now part of Verizon). The local network assets
included the following:
• The local copper loop from the incumbent’s equipment to the customer
• High-speed lines between the Competitive Local Exchange Carrier (CLEC)
switch and the incumbent’s central office
• RBOC local central office switch ports for connections to local loops
• Operator services
• Signaling services to link central offices to systems, including billing
Many competitors including MCI (now part of Verizon) and Sprint leased entire
platforms of incumbents’ facilities at a discounted rate to offer service without build-
ing their own infrastructure. Some competitors built their whole business around the
resale of incumbent telephone companies’ platforms. Other competitors built their own
facilities in areas where they had concentrations of business customers and used an
incumbent’s entire platforms in other areas.
services. Although initially AT&T and Verizon suspended their residential cable TV
build-outs, they now compete actively with cable TV providers and offer cable TV ser-
vices themselves in parts of the United States. With their purchase of DirecTV, AT&T
now also sells satellite television service.
A second achievement is the mandate that local number portability be imple-
mented. Consumers now take for granted that they can keep their telephone number
when they change mobile carriers, drop their home phone service for mobile service,
and keep their business number when they move or change providers. However, this
was not the case prior to 1996.
Another benefit of the Act is that increased competition and investment in broad-
band facilities led to dramatic decreases in prices for high-speed Internet access and
long-distance services for small and medium-sized businesses. As most competitors
were absorbed into larger telephone companies or went out of business, long-distance
and broadband rates remained low.
Large enterprises for the most part rely mainly on AT&T, CenturyLink, and Veri-
zon because of their global networks. Many large enterprises use connections to a
backup telephone company in the event of a major network outage at their primary
carrier. Large organizations are also more likely to use AT&T and Verizon for mobile
services because they are the only providers with close to nationwide mobile networks.
Regional providers including Windstream and Frontier sell telecommunications and
broadband services but in fewer regions than AT&T, CenturyLink, and Verizon.
Table 3-1 is a sampling of the number of lost cable TV subscribers at the end of
the first quarter of 2018 broadband and provides a comparison of the number to the
same period in 2017. Statistics are from cable TV providers’ first quarter 2018 rev-
enue reports.
To make up for the lost cable TV revenues, all cable TV providers are upgrading
their terrestrial networks to carry additional streaming, cloud, and Internet browsing
residential and enterprise traffic.
often locked out of high-speed broadband links. They may not be able to afford to pur-
chase computers and pay the high rates for Internet access charged in the United States.
There are subsidies available for families of school-aged children that live in low-
cost Housing and Urban Development (HUD) housing or earn below a certain level
of income. Some providers offer subsidized broadband at $10 monthly with data rates
between 10 and 15 Mbps: Comcast, Verizon, Google, and AT&T each offer discounted
services in their coverage areas.
• AT&T: In 2005 SBC, one of the seven local telephone companies, pur-
chased AT&T for its international and interstate long-distance network.
When it purchased AT&T, SBC changed its name to AT&T because of its
higher national recognition. SBC purchased the following providers under its
own name until 2005 when it made these purchases under the AT&T name:
− 1997: SBC purchased Pacific Telesis Group, the Regional Bell Operat-
ing Company (RBOC) in California and Nevada
− 1997: SBC purchased Southern New England Telephone, the incum-
bent telephone company in Connecticut
− 2005: AT&T purchased RBOC Pacific Telesis in California
− 2007: AT&T purchased RBOC Ameritech whose territory included
Michigan, Indiana, Illinois, Ohio, and Wisconsin
• Verizon: In 1997 regional bell operating company Bell Atlantic purchased
NYNEX, the former phone company in New England. NYNEX was cre-
ated from the merger of New York Telephone Company and New England
Telephone Company.
− 2000: Verizon purchased GTE, the largest non-Bell telephone company
in the U.S and changed its name from NYNEX to Verizon
− 2006: Verizon bought MCI, the second largest long-distance company
• CenturyLink: CenturyLink purchased EMBARQ in 2009 from Sprint,
which at that time offered landline telephone service in the Kansas area and
in the Midwest.
The 1984 Breakup of AT&T 133
G
Gradually, more communities added Community Antenna TV (CATV), as the
first systems were known. These systems were made up of large antennas
to
o which heavy coaxial cabling was connected. Because the systems were
analog, they were susceptible to rain leaking into their systems and other
impairments. Gradually, cable TV systems became digital with clearer signals
and increased subscribers who wanted a wider choice of programs than
those available on over-the-air broadcast TV. In the early 1950s there were
259 small providers, but by 1961 there were 288 systems in 36 states.
136 3 Competition, Industry Structures, and Regulations
Most of these early cable TV operators were gradually bought by larger operators,
and became part of Comcast, Charter, or Altice USA. When Netherlands-located
Altice purchased New York cable company Charter, it changed its name to Altice.
Altice sells services in 21 states under the Optimum and SuddenLink brand names.
All four large cable operators are experiencing large losses of cable TV custom-
ers due to competition from streaming services offered by Netflix, Hulu, Amazon,
Disney, and over a hundred others. The largest cable companies are fighting back
by expanding the scope of their offerings and by offering their own streaming ser-
vices. For example, Comcast is in the process of upgrading its hybrid copper/fiber
optical network with more fiber cabling directly to residences and businesses as well
as bringing fiber closer in neighborhoods for the ability to offer the gigabit data rates
needed to support dramatically increased traffic from access to cloud services and
streaming. Infrastructure capable of supporting this is important for marketing and
sales to enterprise customers.
Cable TV providers are also participating in a quasi-price war with competitors
where each provider offers a low initial rate and then raises the price after the term
of subscribers’ initial contract expires. Their main competitors are satellite provid-
ers and telephone companies. Telephone companies are building out their broadband
networks in competition with cable TV providers for the many broadband customers
who have dropped traditional voice service in addition to cable TV, but who do want
high-speed broadband service. The following is a quote from Comcast’s 2017 annual
report discussing what they consider their major competitor—AT&T’s DirecTV
satellite service.
A quote from Comcast’s 2017 Annual Report:
amount of new fiber because antennas are closer together and need to be connected by
fiber to other antennas and to providers’ data centers.
could earn a specific rate of return on its telecommunications services. This marked the
beginning of the concepts of universal service and rate of return guarantees.
While rate of return guarantees did not encourage efficient operations, they did
enable the company to invest in research and development through its Bell Labs divi-
sion. AT&T inventions included touch-tone service, integrated circuits, and laser tech-
nologies. These innovations were freely available without patent fees, were adopted
worldwide, and are one of the reasons that global networks are compatible with one
another today.
In the late 1970s, the introduction of competition from lower-cost long-distance
providers such as Sprint and MCI (now part of Verizon) made it untenable for AT&T
to continue charging high fees for its own long-distance calling. Gradually, AT&T low-
ered its long-distance fees and increased its local service rates to compensate. To make
up for local service subsidies, regulators set fees for carriers to pay one another for
connecting calls to one another’s customers. These are known as Intercarrier Compen-
sation (ICC) fees, and they marked the beginning of the imposition of access charges.
There are two types of access fees: originating access fees and terminating access
fees. They apply to mobile, wireline, and interconnected VoIP traffic. Interconnected
VoIP calls are those made to people on the Public Switched Telephone Network
(PSTN). The PSTN is an older network architecture for home telephones connected
directly to older telephone company switches, not part of data networks.
The following are examples of originating terminating and access fees.
• Originating access fees are paid by phone companies whose customers lease
toll-free numbers.
− A subscriber on a different carrier’s network calls a toll-free (800-888)
number that belongs to another carrier’s subscriber.
− A person places a VoIP call to a toll-free number connected to someone
on the PSTN.
Regulatory Issues 141
Access fees paid to carriers in rural, high-cost areas are set higher than those in
urban areas. Moreover, intrastate access fees, which are set by states, are generally
higher than interstate access fees. Access fee rates for local calls are minimal.
The FCC’s November 2011 Transformation Order laid out a plan for reducing ICC
fees. Terminating access fees, at the receiving telephone company, have been reduced
dramatically over the last 7 years, from several cents per minute down to $0.007 cents
per minute—and even going to zero in most cases by July 2019. To make up for the
loss of revenue experienced by many rural carriers, the FCC also revamped the subsidy
fund from which rate of return carriers can draw. A rate of return carrier is an incum-
bent telephone company that is allowed to adjust their rates so that they earn a set
return, a profit. The rate reductions for originating access fees are the current subject
of another FCC project, for which the FCC is still accepting comments from the public
and affected organizations.
• Subsidies for rural areas where costs for telecommunications facilities are
high because there are fewer homes and businesses per mile
• Rural healthcare facilities
The goal is to enable providers in rural and high-cost areas to offer services at
reasonably comparable rates for similar services in urban areas. The portion of the
A-CAM that applies to schools and libraries is known as the E-rate. The E-rate sub-
sidizes Internet access and infrastructure costs needed for high-speed Internet access.
A-CAM Implementations
In February 2016, the FCC issued a Notice of Proposed Rule Making (NPRM) that
recommended support for broadband services as well as the existing phone subsidies as
a universal service. The proposed rule would gradually eliminate access fees between
long-distance and local telephone companies and offer to replace high-cost support
with the A-CAM. The FCC gave rural providers a choice of staying with high-cost
subsidies or moving to A-CAM payments. The Connect America Fund funds support
new projects and maintenance of existing broadband.
Additionally, there are funds for subsidizing broadband for rural healthcare facili-
ties and hospitals. The goal is to bring these costs down to the same level as healthcare
facilities in urban areas.
The FCC stated that a guaranteed rate of return removes the incentive to oper-
ate efficiently because rate of return guarantees a certain profit regardless of possible
operating inefficiencies. The FCC introduced competitive reverse auctions for granting
money for non-served areas. With reverse auctions, organizations win grants for low
bids for subsidies needed to upgrade infrastructure rather than high bids.
Carriers in these rural areas had a choice of remaining on the high-cost subsidies
or participating in the A-CAM reverse auctions to obtain funding. Because the A-CAM
supports new projects and maintenance of existing projects, most rural providers that
had already upgraded their infrastructure to fiber service opted not to sign up for the
A-CAM. Rather, they kept their high-cost subsidies. In contrast, rural providers that
had not yet upgraded their networks with fiber-optic cabling more suited to broadband
data rates, bid in the reverse auction for A-CAM funds.
Recipients that successfully bid for funds to build broadband networks are subject
to requirements to build out their broadband facilities within 10 years. They must also
make these services available for a defined period of years. The Connect America
Fund supports ongoing maintenance and operations of broadband wireline and wire-
less networks. Moreover, these carriers will no longer receive funding based on rate of
return analysis. Rather, price cap systems will be instituted so that carriers will have
incentives to operate efficiently rather than have guaranteed revenues. With price caps,
carriers agree to impose an upper limit on their rates and keep them at an agreed-upon
level for a specific number of years.
Regulatory Issues 143
As part of the plan, the amount of money collected for A-CAM was capped at
the amount collected in 2011. This did not take into account inflation. This is a major
issue for rural carriers building out their networks. Although, more money has been
allocated to the program, adequate funding is still an issue.
A cable TV stations don't use the public airwaves, they are not regulated
As
under the media consolidation rules.
u
In 2017 the Federal Communications Commission voted to roll back the 1970s
restrictions on media ownership. The new rules allow common ownership of news-
papers and broadcast stations in the same market. Critics in the United States Senate
stated that the order would enable media conglomerates to manage news content and
broadcasts. In particular, senators criticized Sinclair’s proposal to purchase Tribune
Media.
FCC Commissioner Mignon Clyburn also dissented stating:
Mark my words, today will go down in history as the day when the FCC
abdicated its responsibility to uphold the core values of localism, compe-
tition and diversity in broadcasting.
In response to his critics, FCC Chairman Ajit Pai stated that the changes were
necessary to allow media companies to compete with online giants such as Facebook
and Google.
Regulatory Issues 145
Sinclair Broadcast Group owns 173 radio stations in 81 broadcast markets and
locations across the United States. It has been accused of promulgating conservative
views in these local markets. Moreover, many of the stations repeat the very same
broadcasts as all of the rest along with the same conservative commentary on the news.
In August of 2018 the FCC denied Sinclair’s request to purchase Tribune Media.
Sinclair would have acquired 42 more local television stations. The FCC opted not to
waive media ownership rules.
Spam Calls—Robocalls
Robocalls are those dialed by banks of automated dialers that call thousands of house-
holds each hour. It’s illegal to call phone numbers on the national-do-not-call (DNC)
list without explicit permission. According to the Federal Trade Commission (FTC),
in 2017 2.4 billion robocalls were placed every month. Not only are these calls annoy-
ing, but many telemarketers that place these calls defraud people by impersonating
the Internal Revenue Service and asking for a credit card payment to settle a supposed
debt to the IRS. Others make false promises for non-existent goods and services. One
telemarketer was fined for trying to sell fake auto warranties.
Another issue is that robocall traffic can flood 911 centers to such an extent that
legitimate emergency calls are blocked. This occurred in 2017 in large swaths of the
United States. The telemarketers’ automatic dialers sent thousands of calls to the ten-
digit numbers associated with each 911 call center. Because call centers are designed
so that calls forward to backup call centers when there are large volumes of calls, the
robocalls affected 911 centers nationwide.
The following is a quote from an October 4, 2017, Federal Trade Commission
press release, “FTC Testifies Before U.S. Senate Special Committee on Aging on the
Continuing Fight to Combat Illegal Robocalls”:
The FTC’s most recent victory in the fight against illegal Robocalls came
this past June, when a federal district court in Illinois issued an order
imposing the largest civil penalty ever in a DNC* case—$280 million
against satellite television provider Dish Network. The case charged
Dish and its telemarketers with making tens of millions of calls—often
Robocalls—to consumers on the DNC Registry, as well as continuing to
call consumers who had previously asked not to be called again.
develop technology to identify and block illegal calls, launch a consumer education
program, and explore legal options to deter telemarketers. The Robo Strike Force is
made up of telephone companies and smartphone manufacturers. Currently, individu-
als and companies that make illegal robocalls are subject to fines. The Robo Strike
Force is lobbying the Federal government to make robocall telemarketers subject to
criminal penalties, in addition to civil fines.
And, significantly, the Robo Strike Force is developing technology to iden-
tify “spam” calls. The technology is called SHAKEN (Signature-based Handling of
Asserted Information using toKENs) and STIR (Secure Telephone Identity Revisited).
SHAKEN and STIR are designed to authenticate that calls are legitimate and to verify
at the receiving provider’s network that they are legitimate. SHAKEN and STIR oper-
ates by attaching a 15-character encrypted token to legitimate calls at the originat-
ing point of the call and sending the encrypted characters along with the call to the
receiving telephone company as a verification that the call is legitimate. SHAKEN
and STIR only work on VoIP (Voice over Internet Protocol) voice traffic. Encryption
uses mathematical algorithms to scramble bits so that only the intended recipients can
decode them.
Unfortunately, not all mobile apps adhere to COPPA regulations. An April 17,
2018, article in the Washington Post by Hamza Shaban stated that researchers found
that 6,000 apps available in the Google Play Store violated COPPA by collecting per-
sonal information on children. The research was undertaken by the International Com-
puter Science Institute at the University of California at Berkeley.
Mobile Operators
AT&T Mobility and Verizon Wireless are the largest mobile operators in the United
States; they are also the only ones with nationwide coverage. Verizon Wireless’s net-
work covers approximately 322 million people as of 2018 (98 percent of the pop-
ulation). The vast majority of the 325.7 million people in the United States, as of
December 2017, have access to mobile networks. However, high capacity coverage for
data is uneven in rural and mountainous areas.
Mobile network upgrades require sizable capital investments in equipment, fiber
cabling and spectrum to keep up with the growth in traffic. Moreover, upgrades when
new generations of service are introduced require new spectrum, hardware, and soft-
ware. Spectrum is made up of the invisible airwaves that carry wireless signals. See
Chapter 7, “Mobile and Wi-Fi Networks,” for more information on spectrum and
mobile technologies. In addition, mobile providers need to support older generations
of mobile networks until most subscribers have handsets compatible with upgraded
protocols.
150 3 Competition, Industry Structures, and Regulations
B
Because fiber or copper is not needed for every mobile subscriber, initial
deployments of mobile networks cost less than building out cabled, fixed
d
liline networks from scratch. This is why, in developing parts of the world,
most people have cell service, but not fixed-line home telephone service.
It’s unclear if T-Mobile will raise prices if the merger is approved. Until now,
T-Mobile for the most part has had lower rates than Verizon Wireless and AT&T Mobil-
ity. In addition, T-Mobile was the first carrier to offer unlimited voice and data plans
for a fixed monthly fee. Verizon Wireless and AT&T Mobility followed suit, offering
152 3 Competition, Industry Structures, and Regulations
their own unlimited plans, which they have mostly deleted. These unlimited plans are
particularly favorable for subscribers that stream video from companies such as Netf-
lix, Amazon, Hulu, and others.
business strategy is selling capacity on fiber-optic cables they own. These include
Consolidated Telecommunications Services, and NEF.
An example of a wholesale provider is Level 3 whose main line of business was
wholesale services to other telecom companies before it was purchased by Century-
Link. It sold capacity on its interstate long-haul network. Tower builder Crown Castle
purchased fiber network provider Lightower and started a wholesale division called
Crown Castle Fiber to complement its antenna and tower business.
Electric utilities often sell wholesale data network services. Electric utilities own
vast fiber networks over which they transmit electrical signals. They also own dark
fiber, spare fiber that is not “lit” by fiber equipment. When utilities lay fiber, they lay
extra fiber to be prepared for surges in electrical usage or maintenance issues on other
fiber strands.
Carriers that sell wholesale services save money on marketing, retail stores, bill-
ing, and staff. They hope to make up for lower per-user revenues with savings in oper-
ating costs and its customers’ quantity leases. Depending on the arrangement with each
carrier customer, it might also offer handsets and billing platforms to the carrier.
Backhaul Services
Another way that cable TV operators add services to their existing infrastructure
is by leasing spare capacity on their backbone networks to mobile operators.
Multiple Service Operators (MSOs) use their backbone networks to link their
local cable TV facilities to centralized headends that distribute TV and mov-
ies and perform functions such as billing and links to the Internet and other
networks.
Backhaul services that mobile providers lease link cell sites (towers and anten-
nas) to the data centers that support functions such as security and billing. Large
cable TV operators as well as small mobile operators lease backhaul capacity in
locations where they don’t have their own backhaul infrastructure. See Chapter 7
for more information on backhaul and cell sites.
wire is the cable from the telephone pole to an individual residence. RCN and Atlantic
Broadband are examples of overbuilders.
Overbuilders offer voice telephone service and Internet access in addition to pay-TV.
Some also sell broadband services to business customers in areas where they operate.
However, overbuilders underestimated the cost of building and maintaining these
networks. They also overestimated their ability to win customers from incumbent
cable television operators. One factor in the difficulty of attracting enough customers
to be profitable was their lack of financial heft to mount the widespread TV and print
advertising campaigns incumbents mount.
RCN Telecom LLC is the largest overbuilder. It offers service in New York City,
eastern Massachusetts, Philadelphia, and Washington, DC. Private equity firm TPG
purchased RCN and overbuilder Grande in 2016 and manages both RCN and firm
Grande Communications Network LLC. Grande provides cable TV service in Texas.
Atlantic Broadband was purchased by Canadian cable TV company Cogeco in 2017.
Agents
Agents act as independent representatives for carriers. Like insurance agents, a car-
rier’s agent receives commissions on services that it sells. AT&T, Comcast, Verizon,
and CenturyLink started agent programs as a way to lower the cost of selling services
to small businesses. Today many agents sell telephone services as an adjunct to the
telephone and networking equipment that they offer. Agents are certified and receive
some training from the telephone and cable TV companies they represent. They do
not bill customers directly for the voice and data services they sell; rather, customers
receive bills directly from the carriers.
Primarily small and medium-sized organizations use agents because they are often
easier to reach, and some have the ability to help troubleshoot problems when it is not
apparent whether the problem is in the carrier’s connections or the onsite equipment.
Moreover, carriers often prefer to serve smaller business customers with agents to
reduce their own staffing and selling expenses.
Retail outlets such as Best Buy and Staples act as agents for cellular providers
and prepaid cellular services as do small retail outlets in shopping districts and malls.
Wal-Mart, Target, and Amazon sell TracFone Wireless’s prepaid mobile phones and
services. TracFone Wireless is a unit of Mexico’s TelMex. In addition to large retail-
ers, there are often networks of small retailers that act as agents for larger companies
such as Comcast, T-Mobile, Sprint, and Verizon Wireless. The small retailers display
the logos of the carriers that they represent in their stores and sell hardware and acces-
sories for mobile phones in addition to service plans.
provide billing and customer service for their customers and market services under
their own brand. Resellers sell wireline service such as data (Gigabit Ethernet and
other high-speed services), calling cards, Internet access, local calling, long-distance,
mobile services, VoIP services, and international calling. Table 3-7 lists a sampling of
resellers with the networks on which they resell services.
Resellers purchase services at discounts from facility-based telephone and cable
TV providers. They then mark them up, and often offer them below retail cost. Resell-
ers offer services carried on networks owned by AT&T, Sprint, Verizon, T-Mobile, and
other carriers worldwide. Sprint’s network hosts the most resellers in the United States
compared to AT&T and Verizon.
recordings. The largest prisoner telephony providers are Securus Technologies and
Global Tel Link, also known as GTL.
All of these systems place the calls using VoIP technology. Many of these provid-
ers charge prisoners’ families rates many times higher than those made from home or
business telephones. For example, they tack on a surcharge of up to $3.16 for the first
minute of the call plus $0.16 for each additional minute. Various organizations have
sued these providers on the basis that the rates are exorbitantly high. The most recent
suit, a class action suit against county prisons, was filed in May 2018 at the Suffolk
Superior Court in Massachusetts on the basis that these charges amounted to kickbacks
to the prisons, which were paid commissions for these calls. Prisoners calls in state
prisons cost only $0.10 per minute with no surcharge for the first minute. The class
action suit is against the county jails, which are paid commissions by these telecom-
munications companies.
County prison officials justify these rates by claiming that without these extra
funds they would not be able to offer drug addiction and educational programs to
inmates. However, when asked, prisoners’ families responded that they would prefer
lower rates even if some programs were deleted or paid for by higher taxes. The other
issue, in addition to high costs, are claims by prisoners’ families that not infrequently
calls are cut off and prisoners must make a second or third call and pay the initial min-
ute fee of $3.16 a second and third time. Because many prisoners’ families have low
incomes, receiving these calls is a burden for them.
In another lawsuit, the telecommunications companies sued the FCC stating that
because VoIP calls are not regulated they can charge whatever fees they deem appro-
priate. The outcome of this lawsuit is still pending a decision by the judge. In 2015, the
FCC had set limits on charges for prisoners’ phone calls.
available and how to find it. They shared a feeling that web searching needed to be
improved and devised a new approach to sorting results. They took their ideas about
searching for information to other search companies. However, these companies were
focused on expanding into other areas such as adding functions to their portals (the
first screen that people saw when they logged into the site).
In contrast, Brin and Page wanted to focus on search, so they founded their own
company, Google, in 1998 and sought venture capital funding. When Google was
founded, there was competition from other search engines including Microsoft’s Bing
and Yahoo!. However, Google’s site quickly became popular solely by word of mouth
with no advertising.
In August 2015, Google’s founder Larry Page announced the creation of hold-
ing company Alphabet. Alphabet became the vehicle whereby new technologies and
startup companies were funded. Google, a subsidiary of Alphabet, is the cash cow of
the organization. Its revenue from advertising is the driving force that enables Alphabet
to underwrite new ventures such as self-driving cars.
Google has two sources of revenue: licensing its search software to smartphone
manufacturers and enterprises, and advertising on its search sites. Please see “Inves-
tigations into Google Search Practices” in Chapter 6, “The Internet,” for information
on the European Union’s investigation of Google’s privacy practices and page ranking
that favored its own sites for such services as travel and retail over those of competitors.
In addition, Google offers cloud hosting to enterprises in the United States and
internationally. The international locations include Netherlands, Montreal, Finland,
and Hong Kong. Because of their need for capacity for transmitting data between all
of these sites, Google has also invested in subsea, or submarine, cables to ensure that
capacity is available for the massive amounts of data they transmit between all of their
cloud data centers.
In addition to their software, Alphabet purchased former hardware manufacturer
Northern Telecom’s mobile telephone manufacturing unit. They also acquired the
Android mobile operating system from Android Inc. The initial version of Android
was developed by Andy Rubin. The Android operating system is installed primarily
on Google’s Chrome laptops, Google Pixel smartphones, and Samsung smartphones.
Alphabet made over 100 investments using their profits from Google’s advertis-
ing and software rights between 2001 and 2018. Alphabet had total revenue of $31.15
billion in the first quarter of 2018. Growth in mobile services, YouTube, and primarily
Google advertising revenue, is adding to Alphabet’s bottom line. Table 3-8 is a partial
list of acquired companies and services developed by Alphabet and its subsidiaries.
See “Using Search Engines to Unleash Vast Stores of Information” in Chapter 6.
Alphabet has acquired specialty software firms with key patents and software.
Google has additionally enhanced its advertising services with billing and automa-
tion capabilities. In addition, Alphabet is hoping to build future opportunities for ser-
vices and products with its culture of fostering new ideas and innovation by allowing
employees to form spontaneous groups to develop new applications.
158 3 Competition, Industry Structures, and Regulations
Software or
Service Offering Product or Service Capability Status and Capabilities
YouTube Online short form videos posted by Also provides long-form
subscribers streaming videos on
YouTube TV
Waymo LLC Self-driving car software Aimed at ride-hailing cars,
fleet management, and
public transportation; cur-
rently in road tests
earns a commission on all goods these retailers sell on its site. They additionally charge
fees for warehousing and delivering packages for these private retailers if they request
warehouse and delivery service. In 2006, Bezos began offering cloud and security ser-
vices to large and small enterprises on its online data centers. It is the largest hosting
provider in the United States. See Chapter 2, “Data Centers and LANs, Storage, and
IP Private Branch Exchanges,” for more information on Amazon’s cloud computing.
Advertising
Amazon accepts advertising on its site. However, the ads are clearly marked as spon-
sored merchandise. In addition to ads on its own site, it also sponsors an ad network
that places ads on web sites across the Internet.
• Goodreads: A site where people review and comment on books they’ve read.
• Twitch: A video game streaming service that includes chat about games and
video game competitions. It also offers streaming of select Saturday Night
Live shows on which people can comment.
• Audible.com: Audio books.
• Whole Foods Market: 400 supermarkets throughout the U.S. This is
Amazon’s largest purchase at over $40 billion.
• Alexa Internet: Home automation; includes the smaller Echo.
Non-Traditional Competitors 161
In a similar manner to other social networks, Facebook derives its revenue from
advertising on its network. Its ad revenue grew to $11.69 billion in the first quarter of
2018 alone.
In its effort to attract younger subscribers, Facebook has purchased companies
and developed new services and apps. Many of these are geared to the younger people
Facebook is hoping to win back to its sites to increase its advertising revenue. Adver-
tisers pay higher rates for ads aimed at younger age groups. Its subsidiaries and apps
include the following:
• Instagram: A social networking app with 800 million monthly users where
people share videos and photos. Messaging between users enables multiple
video and photo posts sequentially. The multiple posts are available for only
24 hours. The site has photo- and video-formatted ads that are labeled as
advertising.
• Messenger: A chat app that supports mobile voice and texting. Users are not
required to have a Facebook account.
• Oculus VR: A headset that supports virtual reality. Virtual reality is a tech-
nology that supports immersive reality where people playing video games
feel as though they are actually participating in the game. Samsung smart-
phones can be integrated into Oculus VR. A division of Oculus develops
video games for Oculus virtual reality headsets.
• WhatsApp: A messaging app that supports texting and VoIP calling between
international as well as local locations.
• TBH: A polling app geared to teens; it’s short for “to be honest.” TBH has
a list of short surveys with 15 questions that are sent to users’ Facebook
contacts. Respondents select one of four people that fit each of the poll’s
questions. None of the descriptions describe negative traits.
• Workplace: In 2016, Facebook started Workplace, a cloud-based application
for large enterprises with networking features such as messaging via VoIP
and audio and video calling. Unlike, the majority of Facebook’s consumer
sites, Workplace charges fees based on the number of employees that log
into Workplace monthly. It is not an ad-supported service.
• Watch: An ad-supported streaming media service with long form original
video content. Short ads are shown prior to the start of each video.
spam, obscene content, and hate speech. They additionally suspended about 200 suspi-
cious apps and reviewed thousands more. These steps were taken using 10,000 staff
moderators plus automated moderating software programmed to look for key words
and phrases.
Facebook CEO Mark Zuckerberg testified before the United States House of Rep-
resentatives and the Senate in April of 2018 about the Cambridge Analytica’s hacks,
where he pledged to do a better job protecting privacy in the future. He is also now
issuing biannual transparency reports about Facebook’s steps to protect users’ privacy
and efforts to monitor posts and apps on its site.
The ramifications of these hacks is not over for Facebook. Its privacy practices are
being investigated by many states’ Attorney Generals. And the Federal Trade Commis-
sion is investigating Facebook’s violation of a 2011 agreement to protect subscribers’
privacy. If the FTC finds it violated their agreement, they may recommend a record
high monetary fine. In addition, a number of senators stated that Facebook should be
regulated because they are too large to self-regulate themselves.
Facebook additionally testified in May of 2018 before the European Parliament.
The hearing was streamed in real time. It’s unknown at this time what steps if any
the European Parliament will take in response to the hacks and privacy breaches that
occurred at Facebook.
Snapchat has three functions that subscribers can click on. These include recent
articles about celebrities organized in multiple channels. Another section is for chatting
with friends, and a third section is where subscribers can post multiple snaps into a nar-
rative. Posts can include Snapchat emojis and emojis that subscribers customize using
tools on Snapchat. The February 20, 2017, article by David Pierce, “The New Snap-
chat: Less Social, More Fun,” in the online Wall Street Journal stated that Snapchat is:
a place for hanging out with my friends, taking goofy pictures and
watching some fun videos.
these smaller and residential customers. It also provides an onsite server for enterprise
customers that integrates with Microsoft Exchange contact management software. In
addition, many businesspeople who travel for work use Skype and Microsoft Teams on
the road for video and audio conferencing and international telephone calls. Table 3-9
presents a partial list of acquisitions.
Twitter
An international specialized social network, Twitter is another form of social network-
ing. People use Twitter to broadcast microblogs, or “tweets,” of not more than 280
characters to others who “follow” them. Many celebrities and most businesses have a
presence on Twitter. They use it to post timely information about their business and for
public relations purposes. Interestingly, Twitter is used more by people older than 25
than by teens, who mainly use Snapchat and sometimes Instagram. Twitter also streams
live events including inaugurations and sporting events. It includes a “Moments” sec-
tion with photos and updates about celebrities and current events. Users tweet com-
ments on the news and celebrity updates in Moments.
Commercial organizations use both Facebook and Twitter to promote their products
and to monitor people’s reactions to their products and services. In addition to public
relations benefits, feedback on social networks enables businesses to react more quickly
to complaints or to learn how to improve their products. It also enables non-profits to
conduct fund-raising efforts and candidates for public office to gain a following.
166 3 Competition, Industry Structures, and Regulations
Twitter is a public company with 2018 first quarter revenue of $731.6 million.
The majority of Twitter’s revenue is from advertising on its sites and the rest from
licensing fees.
Apple
Apple, Inc., is the world’s most valuable company. It develops both the hardware
specifications and operating system software on its Apple Watches, Apple TV, smart-
phones, desktop computers, Home Ped home automation, laptops, tablets, and Wi-Fi
routers. To a large extent, it also controls the applications that users download from its
App Store. Apple screens every application before it allows developers to sell apps in
its online store.
This control is one factor that has enabled Apple to maintain the high quality of its
products. Apple is currently the leader in premium, high-end products. Its devices are
priced at the high end of their respective market segments. Its high prices are a factor
in Apple’s enormous profits and market capitalization, the number of shares of stock
outstanding multiplied by the current value of each share of stock. As of mid-2018,
Apple’s market capitalization was $1 trillion, the highest of any other company in the
United States.
Apple devices are based on proprietary operating systems and software. They are
“closed” systems that require applications and printers that are compatible with Apple’s
operating systems. Customers who purchase its iPods often use Apple’s iTunes store
for music downloads. Compatibility between the applications in its App Store and the
iTunes web site provides a compelling reason for customers to continue purchasing
Apple gear so that generally all-new apps are not needed for new mobile and wired
computers.
Apple’s major innovation is its user-friendly interfaces, which have been a factor
in the company’s success since its inception, across all of its product lines. The empha-
sis on user-friendly interfaces was instituted by Steve Jobs, Apple’s founder. Prior to
its introduction of the iPad in 2010, only a small number of tablet computers were sold
annually. In contrast, Apple sold 14 million iPads worldwide during the first year they
were available because of the iPad’s innovative, touch-screen interface. This spurred
other manufacturers to introduce their own tablet computers and changed the way
many people in business and homes use computers and watch video today.
Apple introduced its iCloud music, photo sharing, and video storage service in
2011. Subscribers can access their music and video stored on iCloud from any mobile
or wired computer.
The wireless technology, design, and staffing in its retail stores are another exam-
ple of Apple’s innovations. Apple uses wireless service with which its sales associates
can accept credit card payments, print receipts, and have e-mail receipts sent to cus-
tomers, all through handheld devices. The handheld devices include barcode scanners
Non-Traditional Competitors 167
to enter the purchased item and card readers to accept credit card payment. This results
in customers not having to wait in line to pay for purchases, thus saving time and
retail space. There are also demonstration computers, tablets, and iPods on display for
customers to try out. In addition, Apple improved customer service by introducing the
Genius Bar in each store. The Genius Bar is staffed by technical employees who pro-
vide diagnoses of hardware and software issues for customers. The retail stores have
a web-based system for customers to make appointments with the Genius Bar before
coming to the Apple store, further alleviating long waits and lines.
Apple owns iTunes where it sells and streams music, TV shows, and movies. It
also offers streaming music subscriptions called Apple Music. Apple is spending $1
billion to develop original content for streaming. The streaming service is thought to
be available in the spring of 2019.
Like Amazon, Alphabet, and Facebook, Apple acquired expertise for a host of its
offerings by buying companies with the technologies needed for new products and
services. Table 3-10 presents a partial list of acquisitions.
APPENDIX ..............................................................
Table 3-11 Regulatory Highlights
Landmark Acts and
Court Rulings Summary of Acts and Rulings
The Federal Communica- Congress created the FCC and gave it the authority to regulate
tions Act of 1934 interstate telephone, radio, and telegraph companies.
The 1956 Consent Decree The Justice Department allowed AT&T to keep its monopoly
but restricted it to common carrier functions. The Consent
Decree mandated that any patents developed by Bell Labs, then
AT&T, be licensed to all applicants requesting them. This led
to the availability of—among many other things—microwave
technology to MCI and the ability of competitive carriers to
build fiber-optic–based long-distance networks.
The 1969 MCI Case The Federal Communications Commission ruled that MCI,
then known as Microwave Communications, Inc., could con-
nect its equipment to the public network provided that the
network was not harmed. This decision opened the competi-
tive premises equipment (CPE) market to AT&T rivals such
as Northern Telecom and Executone. Prior to this, only AT&T
was allowed to provide telephones for connection to the Public
Switched Telephone Network (PSTN).
The 1982 to 1983 The Justice Department, in agreement with AT&T and with
Modified Final Judgment approval by Judge Harold H. Greene, agreed to a settlement
that
• Divested the then 22 Bell Operating Companies (BOCs)
from AT&T
• Prohibited BOCs from inter-LATA long distance, sale of
CPE, and manufacturing
• Mandated that the local exchange companies provide
equal access (dial 1) from end users to all interexchange
carriers
The 1984 Divestiture The terms spelled out in the Modified Final Judgment were
implemented on January 1, 1984. The 22 Bell telephone
companies were merged into seven Regional Bell Operating
Companies (RBOCs). The RBOCs were allowed to sell local
and toll calling within the 197 defined local or in-state Local
Access And Transport (LATA) areas. They also retained the
Yellow Pages. AT&T retained manufacturing and inter-LATA
(primarily interstate) and international toll calling.
Part III
Managing Broadband
Networks and Broadband
Network Services
Chapter 4 Managing Broadband Networks
Chapter 5 Broadband Network Services
169
This page intentionally left blank
4 Managing Broadband Networks
In this chapter:
Introduction 172
The Public Network 173
Core Networks—Between Cities and Continents 175
Bandwidth Capabilities in Carrier Networks 187
Optical Transport Networks—Carrying Multiple Types of Traffic 191
Transporting Movies and TV in the Core 195
Middle-Mile Networks 197
Last-Mile Access Networks 199
Access Networks in Cable Operators’ Networks 209
Using Cable Modem Termination Systems for IP Traffic 211
Telecommunications Services in National Emergencies 217
Signaling 220
Appendix 224
171
172 4 Managing Broadband Networks
INTRODUCTION .....................................................
Growing dependence on cloud computing, social networking, and in particular video
streaming has caused data traffic to increase more rapidly than ever before. According
to Cisco, busy hour data traffic increased 32 percent from 2015 to 2016, and 51 percent
from 2016 to 2017. This increase in traffic volume presents enormous challenges to
carriers. Adding capacity to networks does not solve issues of managing the added
video on networks. In addition to adding capacity, telephone and cable TV operators
are implementing software to:
4. Regional networks connect cities that range from 200 to 400 miles apart.
This includes Boston to New York City, and New York City to Washing-
ton DC. These links carry traffic in large cities to cable TV and telephone
company switches or routers where traffic is aggregated and connected to
backbone or middle-mile networks.
5. Core networks connect cities and continents. Core networks are also referred
to as the backbone section of networks.
W
Workers in the telecommunications and data-network industry often use
different nomenclature for the same equipment or type of network. For
d
example, core networks are also referred to as long-haul and backbone
e
networks. Access or edge broadband network are commonly referred to as
last-mile and first-mile, and edge networks. In addition, the terms “providers,”
“carriers,” and “Internet Service Providers” (ISPs) are also used synonymously.
They all provide voice, data, mobile service, video, or Internet access.
B
Because no single telephone, cellular, or cable TV company has service
everywhere in the United States or the rest of the world, all providers need
e
cconnections to and from other telephone companies to transmit voice and
data traffic between their own customers, the Internet, the cloud, cellular
networks, and customers served by other providers. They additionally need
connections to carriers in other countries.
• Dropped off at wiring centers and Points of Presence (POPs) closer to urban
and suburban areas.
• Handed off to other long-haul carriers to be transmitted on other routes.
176 4 Managing Broadband Networks
Carriers also transmit data and VoIP traffic between enterprise sites on long-haul
networks. Special arrangements are made with these customers for optional services
such as security and priority treatment for voice and video conferencing. These net-
works are considered part of a carrier’s private data networks. They are separate from
the Internet and offer guaranteed speeds and low latency (unnoticeable levels of delay
or no delay) on an end-to-end basis. For more on this, see Chapter 5, “Broadband
Network Services.”
White Box
The term White Box denotes a server with multiple instances of virtual network
functions (VNFs) within a single server. Each of the functions listed below were
formerly housed in individual, proprietary, vendor-specific hardware “boxes.”
The NFV architecture enables these capabilities, previously implemented in
various pieces of vendor-specific hardware, to exist with other network functions
in a single open source commodity server.
The advantage of a White Box is that functions within it can be more easily
installed and duplicated than installing hardware and backing up each piece of
hardware in the event of failure. Additionally, network functions can be added
more quickly, a factor in increasing the speed of upgrading network functions.
Switch
Router
Firewall
VNF Software on a commodity server with an Open Source operating system, e.g. is Linux, Junos etc.
A proprietary operating system can also be used.
Figure 4-1 A White Box with network hardware abstracted in VNF software.
Core Networks—Between Cities and Continents 179
The following are examples of Virtual Network Functions, which can be virtual-
ized as software within servers and White Boxes:
The key advantages of installing network functions in software are flexibility, agil-
ity, and speed of implementation. Functions can be deployed and duplicated easily and
quickly using computer commands in software. Instead of programming, purchasing,
and managing distinct pieces of hardware, control software can be used to add network
functions to the parts of networks where they are needed.
Because these critical functions are all in one server, if the server malfunctions,
all of these functions are lost. For greater reliability and sustainability (the ability to be
operational during malfunctions), telephone companies often deploy duplicate White
Boxes. If one fails the other is able to take over.
Policies defined within Software Defined Networks indicate how to route, priori-
tize, balance traffic loads, and program firewalls. The policies that control networks
are programmed and defined by IT staff at computer screens. They are then invoked
automatically as required.
database
CORD is meant to emulate cloud services that depend on virtualization, can scale
up or down easily, and whose features are managed directly by customers. The soft-
ware in CORD-based central offices can be located in the cloud and managed by manu-
facturers, or remotely by telephone companies. They may alternately be managed and
located at carriers’ own data centers.
The goal, in addition to saving money on central offices, is to simplify and impor-
tantly, speed up the availability of new applications for enterprise, mobile, and residen-
tial landline telephone companies’ customers. This is a potential source of new revenue
for carriers and may lower telephone companies’ total cost of ownership (TCO).
The Central Office Re-architected as a Data center standard includes capabilities
that enable enterprise customers to access and download new services and/or change
existing features remotely via centrally located consoles. According to the March
22, 2017, LightReading article “CenturyLink Delivers DSL Using CORD Platform,”
CenturyLink is supplying DSL to enterprise and residential customers from its CORD
central offices. In another article published by Fierce Telecom on February 9, 2017,
Glen Post, CEO and Chairman of CenturyLink, was quoted as following:
Enterprise customers have the ability to manage services such as DSL at centrally
located consoles from headquarters and branch offices. The modifications and addi-
tions can be performed without carriers dispatching technicians to customer sites. This
saves telephone companies the expense of “truck rolls,” dispatching technicians to
customers’ locations.
One strategy that telephone companies use to implement Central Office Re-architected
as a Data Center (CORD) is to add CORD data center elements within their traditional
central office. In this way, the functions in traditional central offices can be gradually
transitioned to CORD equipment and virtualized servers.
Telephone companies are additionally merging mobile central office functions (the
core in mobile networks) and their landline central office functions in CORD data cen-
ters. During the transitions clashes between the two types of staff may occur. However,
the end result is lower costs to operate networks.
T type of staff required to manage and program SDNs, CORD, and NFV are
The
software engineers able to design, develop, test, and upload software compati-
s
ble with the cloud environments where CORD offices are located. They addition-
b
ally are required to understand ways to interface and integrate older network
technologies with SDN and NFV via application programming interfaces (APIs).
Staff that monitored network conditions from traditional central offices needed to
monitor large telephone networks. In CORD, central offices cloud development (DevOps)
skills are required to manage new central offices that are essentially large data centers.
Routers need to be stateful to keep track of all the parts of sessions that
belong together.
Continued
184 4 Managing Broadband Networks
The above functions are consolidated into software by 128 Technology, not
managed separately in servers. 128 Technology believes that their software can
control network routing more efficiently in SDN and other broadband services
without layers of abstraction and complexity.
128 Technology’s software is installed on commodity hardware, and pow-
ered by Intel X86 computer chipsets that eliminate latency (delays) and
enable the speed required for real-time, high-speed packet forwarding on
commodity hardware. It is additionally able to operate as network virtual-
ization functions on servers.
Security incorporated into the software is zero trust software that assumes
the presence of malware. It includes perimeter security that checks packets
as they exit the premise to prevent insiders from causing security lapses by
falling for phishing attempts, user error, or malicious employee behavior.
The zero trust policy looks at the first packet, where it’s from (its source),
what service is used, and what it is allowed to access. Packets are addition-
ally checked at every point on the route.
In addition, proprietary encryption developed in-house is used to safeguard
privacy. Encryption uses complex mathematical formulas to ensure that only
authorized devices can “read” user information within packets. Another security
precaution 128 Technology takes is the use of Access Control List (ACL) soft-
ware that filters out packets that are not permitted according to the ACL rules.
128 Technology’s software is an alternative method that provides a way to
manage networks at lower costs with less operational complexity. It addition-
ally includes security software and the ability to route sessions together on the
most optimal routes. 128 Technology’s software is at Amazon Web Services and
Microsoft Azure web sites where it can be used by customers to manage work
flows between cloud suppliers and applications and across data centers.
Core Networks—Between Cities and Continents 185
Hillsboro
Emi
Toyohashi Los Angeles
Pacific Ocean
Piti
Figure 4-3 A submarine cable connecting the United States and Japan.
(Courtesy of Telegeography)
Power Limitations
Power must be supplied at the terrestrial end of each fiber bundle. In contrast to terres-
trial fiber where power can be added along the route, it’s not possible to supply power
at various points in each undersea cable bundle.
Currently available power technology at each end of a bundle of fiber cables sup-
ports only six fiber pairs. This limits the number of fiber pairs in each route. Vari-
ous organizations are looking at ways to increase power capabilities so that additional
strands of fiber can be supported in each bundle.
#5 – Route diversity
Repairs per Year Outage (days/year)
Philippines- Taiwan 2.7 42.8
Singapore-Hong Kong 2.6 45.5
Hong Kong-Tokyo 2.1 37.8
Mumbai-Singapore 1.0 26.6
Tokyo-Los Angeles 0.5 8.4
Source: Palmer-Felgate, A., and Booi, P., How Resilient is the Global Cable Network?
SubOptic 2016 #OralWE2A-5
• There are a limited number of ships equipped to repair submarine cable cuts.
• Nations have concerns that ships in their waters could eavesdrop on commu-
nications from ships repairing cables.
• It can take weeks to be granted permission for these ships to be allowed to
repair cuts in other countries’ waters.
L
Legacy is a term used to describe networks and equipment that are based
on older technologies such as TDM and analog voice service.
o
188 4 Managing Broadband Networks
To
Topology refers to the design of how devices are physically connected. It is
the “the view from above.”
th
ADM ADM
Traditional rings
ADM ADM ADM ADM
Primary path
ADM ADM
Egress
Alternate
path
Ingress
Routes with
outages
Resilient mesh
• Automated provisioning*
• Dynamic path choices for multiple failures
• High network availability
• Bandwidth optimization
*Provisioning refers to the planning, design, and installation of network equipment and routes.
OTN can be thought of as the freight containers that carry Ethernet, IP,
and SONET optical traffic together.
The OTN standard was created for the efficient operation of providers’ multi-protocol
metropolitan and global optical networks using interoperable equipment. The standard
provides a framework for programming, monitoring, and transmitting the growing
amounts of IP packet, Gigabit Ethernet, video, and MPLS (Multi-Protocol Label Ser-
vice) traffic while preserving its capability to carry legacy traffic on optical networks.
All of the services—1 and 10 Gigabit Ethernet, SONET, and video can be on the same
line card and are software programmable.
It does so by specifying the encapsulation of legacy SONET/Synchronous Digital
Hierarchy (SDH) traffic into OTN frames and its overhead information for address-
ing and billing on fiber-optic cabling. OTN, which can scale to 400Gbps and Terabit
capacities, overcomes SONET’s 40 Gigabit per second capacity. See Table 4-2 in the
“Appendix” for information on SONET speeds.
OTN equipment has optional modules for connecting to Dense Wavelength Divi-
sion Multiplexing (DWDM) as well as Reconfigurable Optical Add/Drop Multiplexing
(ROADM) so that individual wavelengths can be seamlessly added and dropped off at,
for example, carriers’ POPs. Both SONET/SDH and IP traffic can be carried on the
same wavelength. (DWDM gear splits each pair of fiber cabling into multiple paths
called wavelengths.) Manufacturers that offer OTN gear include Calix, Ciena, Cisco,
Fujitsu, Infinera, and Nokia.
192 4 Managing Broadband Networks
Today’s networks are required to carry a mix of the more efficient gigabit Ethernet
as well as traffic using the older SONET and MPLS protocols. Optical Transport
Network is an important protocol for transporting both digital Internet Protocol (IP)
signals as well older synchronous traffic in a single stream. Gigabit Ethernet sup-
ports the massive increases in traffic due mainly to traffic generated by enterprises and
consumers accessing the cloud, by consumers streaming TV and movies from Netflix,
Amazon, and their competitors, and from applications such as online gaming.
The newer, more efficient Gigabit Ethernet is able to carry many times more
bits per second than SONET and MPLS. Gigabit Ethernet is available at data rates
of 10, 40, 100, and 400 bits per second. While the amount of traffic generated using
Gigabit Ethernet is increasing rapidly, there is still traffic in the SONET and MPLS
format. However, the amount of traffic generated in particular by SONET gear
is decreasing rapidly. At some point OTN use will not be needed as SONET and MPLS
traffic drastically decreases.
• Add traffic
• Separate out traffic
• Drop off traffic
ROADM equipment eliminates the extra cost and maintenance for conversion
equipment. Conversion equipment converts signals to electrical signals and back to
light signals. Prior to the availability of ROADMs, light signals had to be converted
to electrical signals before they could be added or dropped off and routed elsewhere.
ROADMs were first deployed in core networks so that, for example, some of the
traffic between cities such as New York and Chicago could be more easily routed to
Los Angeles. As traffic within metropolitan areas increased, ROADMs began to be
used in these areas as well. Dense Wavelength Division Multiplexers (DWDMs) and
OTN equipment can be equipped with ROADM cards so fewer pieces of gear need to
be maintained.
ROADMs are additionally used to connect long-haul carriers to carriers in met-
ropolitan areas. For example, ROADMs enable AT&T to drop local traffic off to local
providers such as Verizon or Comcast. To transmit traffic between different telephone
companies, often technicians from each company call each other to make sure their
ROADMs can interoperate. The technicians often determine a way to connect via com-
patible Application Programming Interfaces (APIs). This causes delays in setting up
connections.
The Open ROADM Multi-Source Agreement (MSA), which is in tests and limited
availability at providers and manufacturers, is a solution to ROADM interoperability.
With ROADM MSA, carriers can add and drop single wavelengths to ROADMs manu-
factured by other vendors. See Figure 4-6 for an example of an open source ROADM.
AT&T announced they were able to add and drop single 100 Gigabit wavelengths
between Ciena and Fujitsu ROADMs. Legacy ROADMs may not be upgradeable due
to older, fixed optical parts that are not programmable for compatibility to the Open
ROADM MSA.
194 4 Managing Broadband Networks
Management Plane
Today's ROADM systems require a single
Vendor A Vendor B vendor with tight coupling of proprietary
ATT OSS
EMS EMS
software (EMS and planning tools)
Provisioning, Routing
Restoration, Network
topology/State,
Monitoring, Alarms,...
City A City B
alternate routes available in the event of outages and congestion. NOC staff
reroute traffic in these instances if an alternative path is available.
Akamai developed its own proprietary protocol, FastTCP (Transmission Control
Protocol) as a replacement for the 40-year-old TCP, which introduces delays in
transmissions. TCP was designed for resiliency, not for today’s densely trafficked
networks where delays are unacceptable. Delays in TCP are caused by its continual
acknowledgments of received packets and negative acknowledgments of dropped
packets. Acknowledgments in TCP are known as acks and notice of packets dropped
are known as negative acknowledgments, nacks. FastTCP streamlines these pro-
cesses to prevent delays. FastTCP algorithms are deployed in Akamai edge servers.
According to Eric Buda, Senior Director of Global Platform Operations at Akamai,
Akamai also provides a security service for customers. The security software
screens packet headers for malware. It doesn’t look at the actual payload (user
data) in packets. To ensure privacy, payload content is encrypted. When Aka-
mai’s security software sees evidence of malware, such as overly long packets
or hundreds of percentages of more than the usual amount of traffic, it sends the
traffic to Akamai’s scrubbing center, which removes the malware and sends the
legitimate traffic to the network.
Other content delivery networks in addition to Akamai are Level 3 (part of Cen-
turyLink) and Limelight. Some carriers also operate content delivery networks.
(NOCs) capable of monitoring and making programming changes to the network as well as
operations support systems can be located here as well. These centers typically serve 7 to
10 towns. Multiple hubs that distribute content are connected to the headend, as shown in
Figure 4-7.
Coaxial cable
Amplifier to strengthen signals
Hub Sites
Hubs, also referred to as distribution hubs, are small buildings that are located closer
to customers than headends. Local programming or frequently downloaded content
might be located at a hub, which serves between 10,000 and 50,000 residences. In
addition, cable modem termination systems, which manage traffic to traditional cable
TV customers’ modems and to the headend, are located at hubs. For more information,
see the section “Using Cable Modem Termination Systems for IP Traffic” later in this
chapter. A hub might serve a metropolitan area. Large towns would have two hubs.
shorter distances than core, backbone networks. They carry a mix of voice, data, and
video on demand, as well as television signals. Cable TV Metropolitan networks are
made up of hybrid fiber/coaxial cabling with fiber for the core that transmits movies to
neighborhoods, and parts of their networks in cities far from the headend. These cities
have nodes with wiring center (transmission) equipment.
Older MANs transmit traffic to headends’ SONET rings. Cable operators and tra-
ditional telephone companies are transitioning parts of their metropolitan networks to
all-IP, Gigabit Ethernet. It is complex and costly to upgrade all of a carrier’s MANs
simultaneously. However, carriers have the option of gradually upgrading a few net-
works at a time. These upgrades don’t involve the immense upgrades as those in core
networks. MANs are equipped with either redundant fiber rings or the simpler Optical
Transport Network (OTN) option as backup technologies in the event of a fiber cut or
equipment failure.
Figure 4-8 The middle-mile connection between rural last-mile providers and a
core network interconnection point for transport to the Internet.
198 4 Managing Broadband Networks
According to Iowa Representative Rod Blum, high cost is the major reason that
39 percent of people in rural areas have no access to broadband compared to 4
percent in urban areas. With fewer customers in their territories, telephone pro-
viders must spread out the cost of upgrades over fewer customers. This results in
lower profits per customer. Blum’s remarks were reported in the June 23, 2017,
B&C online journal article, “Small Business Committee has Big Interest in
Rural Broadband,” by John Eggerton.
The middle-mile costs associated with interconnection to the Internet are passed
on to end users in the form of higher Internet access fees. These higher fees are
another factor that inhibits many customers from purchasing Internet access in
rural areas. Slower speeds that make access to streaming TV videos sluggish and
cumbersome are also a factor in lower adoption rates in these areas.
Connections to middle-mile networks by rural providers are a mix of microwave
and fiber-optic cabling. According to an anonymous staff person at a long-haul
network provider, “The lowest-priced way to reach an interconnection point
in middle-mile networks is microwave, at $150,000 to $200,000 for the tower
and about $40,000 for equipment at the tower.” An interconnection point is the
equipment cabinet with Gigabit Ethernet or SONET gear, which connects rural
providers’ networks to middle mile networks, which connect traffic from rural
locations to large providers’ nationwide, backbone networks.
A
Aerial fiber is less expensive than buried fiber cabling, but
more subject to environmental damage such as tornados, snow
m
storms, fallen branches, and so on.
s
These investments in fiber are too costly for the small rural carriers that NECA
reports have an average customer base of only 4,324 access lines. Few of
NECA’s carriers have more than 10,000 access lines in service, which is the
threshold at which these connections become economically viable.
subscriber’s voice service to the same broadband infrastructure as that used for data
and TV. Most of them provide VoIP over the broadband.
cabinets placed between the central office and the subscriber. The connection between
the DSLAM and an ISP is a potential site for network congestion and delays, if capac-
ity is insufficient between the DSLAM and the central office.
When telecoms move fiber closer to customers in neighborhoods, they often use
mini Remote Access Multiplexers (mini-RAMs), which are about the size of pizza
boxes, to convert light signals carried on fiber to electrical signals and vice versa.
Installing fiber closer to homes results in shorter copper lengths. Shorter copper runs
have fewer impairments because electrical signals fade less as they travel over shorter
distances. Impairments found on longer copper runs farther from central offices cause
DSL speeds to decrease dramatically and often prevent DSL from being viable at even
slower speeds. Traffic from mini-RAMs is aggregated in DSLAMs, from where it is
transmitted over fiber to central offices and the Internet.
Mini-RAMs can be located on utility poles or in stand-alone boxes on the ground
and serve 10 to 24 customers (see Figure 4-9). Local power is not required because
it is fed to mini-RAMs through the copper telephone lines either on the pole or
underground.
DSLAM
Mini-RAM PSTN
aggregation
switch
Copper-to-DSL
modems in homes
Headend
Central office
Mini-RAM Fiber
Internet
hotels, restaurants, and municipalities as well as residential customers. One way they
provide capacity needed to handle all of these services is to add fiber closer to homes
and businesses or directly to premises. When carriers transition to fiber to homes, voice
signals are sent in digital, voice over Internet (VoIP) packets, rather than as electrical
signals on copper cabling. Providers that transition to fiber to homes or even fiber close
to homes in neighborhoods, gain these advantages:
• Fiber cabling has more capacity than copper to support the continuing
growth in broadband traffic and cloud and streaming media.
• Operating costs are lower because it is more efficient for providers to main-
tain just one type of cabling and equipment than two types of cabling.
• Central offices only need to be equipped with equipment that supports a
single type of cabling rather than both fiber and copper.
• Less network equipment is required because signals on fiber travel further
than those on copper cabling before deteriorating. When signals fade, equip-
ment is required to boost signals.
In
Instead of fiber, when cabling is closer to homes, coaxial cabling or
unshielded twisted-pair are often used to transmit signals over the last few
u
h
hundred feet from subscribers.
Last-Mile Access Networks 205
PONs are used extensively in mobile networks as well where they transmit signals
between antennas and carriers’ data centers. Data centers in mobile networks are where
mobile providers manage their wireless networks, collect usage data for billing, and
offer special applications such as voice mail and text messaging.
With PON technology, only one pair of fiber is brought to the neighborhood but
multiple pairs are split out from PON interfaces to homes. Splitters divide the capac-
ity of the fiber among up to 32 homes and small businesses. Figure 4-10 shows one
possible scenario. Splitters are passive in that they don’t require electricity and they
are small; they’re about the size of a smartphone. These are key factors because space
in the network is at a premium and electrical costs are soaring. PON equipment at the
central office, inside customers’ premises, and in cabinets in neighborhoods do require
electricity.
PASSIVE
MSAN Uses GPON Components
Central
Office ADTRAN ONT
IPTV Head End
Splitter
ADTRAN ONT
Internet IP Core
ADTRAN ONT
Voice Switch
ADTRAN ONT
ACTIVE
Uses Active Ethernet Components
ADTRAN ONT
See Table 4-1 for ITU-T (International Telecommunications Union Terminals for
Telematic Services) PON standards.
In the newest PON standard, Next Generation Passive Optical Network 2 (NG
PON2), wavelengths can be turned on remotely and the lasers connected to the fiber
can be modified so that the provider is not required to pay for a “truck roll” to send
out a technician to make a change at the splitter. According to PON provider Adtran,
the ability to add capacity by programming future-proofs NG PON2 against expected
increases in traffic, particularly video streaming and cloud computing. As residents’
and businesses’ broadband use increases, new hardware is not required. Additional
capacity for individual wavelengths can be added via software.
PON service was initially introduced in North America in 2002. Currently, Adtran,
Nokia (through its purchase of Alcatel Lucent), Tellabs, and the Chinese company
Huawei manufacture PON components available in North America. Older PON
standards are listed in Table 4-3 in the “Appendix.”
Figure 4-11 An Optical Line Terminal with ports on cards where fiber is
terminated in central offices. (Photo courtesy of Adtran Inc.)
• Homes
• Enterprises distribution frames where copper cabling is terminated
• Apartment buildings
• Wi-Fi modems if all signals within a building are transmitted on Wi-Fi
• Hospitals
• Cellular backhaul where signals are “backhauled” from cellular data centers
to networks
• Wholesale cellular backhaul providers who resell backhaul capacity to
facilities-based cellular companies
• Coaxial cabling in cable TV networks where fiber is installed in residential
neighborhoods closer to homes
• Nodes in neighborhoods where fiber is terminated closer to, but not directly
connected to a residence or small business
208 4 Managing Broadband Networks
2016
True FTTH Connected Penetration
FTTH
vs. Other Most Similar Countries
CONNECT
Spain 15%
USA The US probably has the highest level of
11%
deployment difficulty in the world - high
Canada 6% population (319 Million), and yet low real
China 5% population density (179).
Australia 5% Comparing to countries that have at least
35 million in population, and a real density
Mexico 4%
measure below 500, the US is second in
Russia 3% true FTTH deployment, Canada is third
Turkey 3% and Mexico is fifth. (Based on 2015 Global
ranking data excluding fiber to the
France 2% building.)
Germany 1%
Poland 1%
0% 20% 40% 60% 80% 100%
Figure 4-12 Countries with the largest percentage of fiber to the home.
(Courtesy of Broadband Association)
Access Networks in Cable Operators’ Networks 209
neighborhoods and then use twisted-pair or coaxial cabling to serve customers. Some
providers bring fiber all the way to curbside pedestals in much of their territory. These
implementations serve only 8 to 12 customers per PON device. PON service closer to
customers is more expensive per subscriber to deploy but provides higher-speed ser-
vice because fewer customers share the fiber.
PONs are also used to bring fiber all the way to premises in new “greenfield”
developments (new industrial or residential developments). In addition, they are the
basis for wireline infrastructure in developing countries. In addition to providing large
amounts of capacity, fiber is less costly to maintain than copper cabling. Less equip-
ment is needed to boost signals that fade, there are fewer repair issues, and capacity
can be upgraded by changing equipment connected to fiber. Entire new fiber strands
are not usually required.
M
MSOs are large cable TV providers with service areas that extend over
many states. They are referred to as MSOs because they grew by purchas-
m
ing other cable companies and merging operations with these often smaller
in
companies’ systems. Comcast Corporation, Cox Cable, and Charter Com-
munication are examples of MSOs in the United States.
CMTSs monitor the level of traffic at each fiber node so that cable providers are
aware when congestion occurs and nodes need to be added to serve fewer homes per
node. Moreover, they are responsible for encryption to ensure privacy, security, and
conditional access. Conditional access is the determination of whether a customer is
entitled to certain features. CMTS devices have built-in routers that send traffic to dif-
ferent destinations such as the Internet, long-distance providers, or the cable MSO’s
VoIP equipment.
CMTSs are similar in function to Digital Subscriber Line Access Multiplex-
ers (DSLAMs) that are used in traditional telephone company networks in that both
devices translate between modems at customers’ premises and equipment in back-
bone networks. They both also aggregate traffic from multiple subscribers into a single
stream for transmission in the backbone. (See the section “Digital Subscriber Line
Access Multiplexers,” earlier in this chapter, for a discussion on DSLAMs.)
B
Bonding is the process of combining adjacent channels into one large chan-
nel to support higher-speed services. For example, bonding four channels
n
together that each comprise 38 1Mb channels creates a single 152Mb
to
channel. In effect, bonding creates a bigger pipe that is shared by homes
connected to the same node.
Bonding increases capacity for Internet access. However, it does so by
using channels previously available for video, which of course, decreases
the number of available video channels. It does not increase the total
amount of capacity on cable networks, many of which had a top capacity of
860MHz. Bonding, rate shaping, and improved compression increase the
amount of data (throughput) that the network can handle, but they do not
increase overall capacity. For more information on rate shaping, read the
section “Adding Capacity to Access Networks,” earlier in this chapter.
access. To add capacity on coaxial cable, operators are upgrading their networks using
advanced QAM multiplexing techniques.
Because of its support for Quality of Service (QoS), DOCSIS 3.0 supported appli-
cations such as voice and video, which are sensitive to delays. An upgrade to DOCSIS
3.0 required a new DOCSIS 3.0–compatible cable modem at the subscriber location
and at the CMTS. This made the upgrade a costly endeavor.
Competition from carriers that offer fiber to the premises (FTTP) is one factor
that spurred implementation of DOCSIS 3.0 and full duplex, sending and receiving
on the same cable or channel. DOCSIS 3.1’s higher-capacity offerings have capacities
from 1 to 10Gbps to support broadband to residential and business customers. MSOs
deploy direct fiber to enterprise customers. Unlike offering to residential subscribers,
cable TV direct fiber connections to enterprises are not shared with other customers
that subscribe to broadband. They are connected directly to cable operators’ transport
networks.
fiber footprint closer into neighborhoods. Fiber closer to homes results in shortened
coaxial cable lengths. Shorter coaxial cabling runs have less impairment from electri-
cal noise than longer coaxial cable runs.
There is also a DOCSIS 3.1 specification for half duplex, asymmetric service.
Asymmetric DOCSIS 3.1 specifies 10 Gigabits downstream and 1 Gigabit upstream
from customers to the provider’s headend. In these instances, DOCSIS 3.0 spectrum is
used for the upstream bits toward the cable TV network and DOCSIS 3.1 spectrum for
downstream spectrum to subscribers.
Upgrading to 10GHz adds capacity for Internet browsing as well as movies sent
using IP. Unlike bonding, it does not decrease the amount of capacity for video. How-
ever, it is costly. Optical transceivers and receivers as well as amplifiers and set-top
boxes need to be replaced or upgraded, depending on the age of the existing cabling
and electronics. Optical transceivers and receivers convert signals on optical cabling
to those compatible with copper cabling, and vice versa. Amplifiers strengthen sig-
nals that naturally weaken after traveling over distances, particularly on copper-based
coaxial.
now offer streaming. Subscribers without cable TV service receive programs over the
air via an antenna wired to their TVs. The antenna can be installed on their roof or the
outside of their home. Subscribers close enough to broadcasting towers are able to use
indoor antennas to receive over the air TV broadcasts.
The escalating subscription fees combined with the many interruptions for com-
mercials on cable TV has motivated many subscribers to “cut the cord” and rely only
on over the top (OTT) streaming media from Netflix, Amazon, Hulu, and others.
According to Nielson, by the first quarter of 2017, 123.6 million people in the United
States subscribed to OTT streaming TV from Netflix, Amazon, Hulu, and others. Oth-
ers subscribe to fewer cable TV stations. They “slim down” their cable TV bundle by
subscribing to fewer cable TV stations. These slimmed down cable TV packages are
referred to as skinny bundles. Many subscribers pay for an OTT subscription in addi-
tion to their slimmed down or full cable TV subscriptions.
Traditional telephone companies including AT&T and CenturyLink are encroach-
ing on cable MSOs by offering subscriptions to their movie and TV programming,
IP voice telephony, and broadband over their copper or fiber infrastructure. Verizon
currently has the most territory in the United States where they offer service bundles
over fiber. They carry IP voice, television, and Internet broadband transmissions over
their fiber to homes. AT&T and most other telephone companies compete with MSOs
by offering triple play services: voice, data, and TV programs. They build out fiber to
the closest neighborhood node (equipment cabinet), and use copper for the last few
hundred feet in areas where they don’t provide fiber directly to homes.
Satellite TV
Satellite TV operators offer bundles with both streaming TV and national broadcast
stations. Dish and AT&T’s DirecTV are the only satellite TV providers in the United
States. Satellite TV is particularly popular in rural areas where fiber to homes is not
available. Satellite TV is important in rural areas in the United States, particularly
where cable TV is not available because low population density makes it unprofitable
to lay cabling directly to homes.
• Wireline
• Wireless
• Paging
• Cable TV
• Satellite TV
• Signaling systems
In addition, fiber-optic outages of lines that carry traffic between backbone net-
work switches must be reported. Reports on outages are reviewed quarterly by the
Network Reliability Steering Committee (NRSC), which is made up of representatives
from nationwide wireline and wireless providers. The committee looks for patterns by
type of failure so that they can determine ways to prevent them.
218 4 Managing Broadband Networks
officials, and national public safety organizations held a series of meetings, and by
2007 had ironed out their differences.
By 2012, spectrum had been allocated and Congress authorized the creation of
the public-private First Responder Network Authority, known as FirstNet, an
independent arm of the Department of Commerce. In 2017, FirstNet awarded
AT&T a 25-year contract to build a wireless network dedicated to the use of first
responders in emergencies. The U.S. Congress allocated $7 billion for build-
ing the network. The money was part of the Middle Class Tax Relief and Job
Creation Act of 2012.
Every state in the United States is required to have a compatible wireless
network. They can opt in to the AT&T network, which AT&T would build in
their state, or build their own first responder network. All states’ networks must
be compatible with the FirstNet being built by AT&T by December 2017; all
50 states had agreed to join the FirstNet network. In August 2017, Verizon
announced that it is also building a national public safety network that will be
separate from its commercial network.
First responders in states that have opted into the AT&T offering do have the
choice of using Verizon’s national public safety network. However, as an added
incentive to join their network, AT&T pledged to add cellular infrastructure in
areas sparsely equipped for service.
Because of its critical role, the FCC attempted to alter the way the Internet is
regulated so that the agency has more oversight of cyber security and sustainabil-
ity. It attempted to have the Internet classified as a telecommunications entity rather
than a value-added service. However, with the changeover of the FCC when Donald
Trump was elected president, the FCC has dropped its efforts to classify the transmis-
sion component of Internet services as telecommunications. The effort to regulate
the Internet did not include monitoring content on web sites or content transmitted to
web sites.
SIGNALING ............................................................
Signaling is the process of sending control information over landline and mobile net-
works to monitor, control, route, and set up sessions between devices. These sessions
include video and audio conference calls, data sessions, video calls, and mobile and
landline telephone calls. Signaling is also used to set up instant messaging and chat
sessions. Signaling is used within public landline and, mobile networks, and the Inter-
net as well as for intercarrier connections and billing.
An Overview of Signaling
Signaling is used to process every call on the Public Switched Telephone Network
(PSTN), the Internet, and the public cellular network. When a caller dials a number,
he or she can hear progress tones such as dial tone, ringing, busy signals, or reorder
tones. These are all signaling tones. In addition to tones, callers might hear digital
messages informing them that the number they dialed is not in service or has been
changed.
The PSTN (Public Switched Telephone Network) uses Signaling System 7 (SS7).
IP networks mainly use variations of Session Initiation Protocol (SIP) as the common
platforms for call setup, teardown and activation, and control of advanced features.
SIP was originally designed for the Internet, but is now used in private data networks
and data networks that carry IP voice as well. A form of SIP is also used for text
messages.
Signaling is the basis of interconnection between mobile, global wireless, and
multiple providers’ networks. When AT&T controlled most of the public network in
the United States, it had the necessary control of the public network that enabled it
to set a standard (SS7) that was followed across the country and was later adopted,
with variations, by the international community. SIP is additionally used in IP
PBXs to carry calling identification, and to set up and tear down video and audio
conferences.
Signaling 221
APPENDIX ..............................................................
Table 4-2 SONET: A North American Standard for Multiplexing Streams of Traffic
onto Fiber-Optic Cabling and Transporting It at Optical Carrier (OC) Speeds*
North American
Synchronous European Synchronous
Transport Synchronous Digital
Signal (STS) Transfer Mode Hierarchy (SDH)
Speed Levels SONET Channels (STM) Levels Channels
52Mbps OC-1 28 DS1s or 1 DS3 STM-0 21 E1s
155Mbps OC-3 84 DS1s or 3 DS3s STM-1 63 E1s or 1 E4
622Mbps OC-12 336 DS1s or 12 DS3s STM-4 252 E1s or 4 E4s
2,488Mbps OC-48 1,344 DS1s or STM-16 1,008 E1s or
48 DS3s 16 E4s
9,953Mbps OC-192 5,376 DS1s or STM-64 4,032 E1s or
192 DS3s 64 E4s
39.812Gbps OC-768 21,504 DS1s or STM-256 16,128 E1s or
768 DS3s 256 E4s
*SONET was developed to aggregate (multiplex) and carry TDM (Time Division Multiplexed) and circuit-switched voice
traffic from multiple sources. The international version of SONET is Synchronous Digital Hierarchy (SDH). SONET SDH
carries traffic at Synchronous Transfer Mode (STM) rates.
227
228 5 Broadband Network Services
INTRODUCTION .....................................................
T oday’s broadband networks are increasingly made up of high-speed fiber-optic links
with the augmented capacity required by the growing reliance on applications located
on the Internet and in the cloud. Current workplaces cannot come close to functioning
without the reliable, high-capacity broadband links now available. Older broadband
technologies have capacity and flexibility limitations that make them unsuitable for
most of today’s requirements.
Carrier Gigabit Ethernet and dedicated wavelengths are largely replacing older,
inflexible, limited-in-speed, broadband services wherever fiber cabling is available.
Gigabit Ethernet is now commonly deployed on fiber cabling at enterprise locations.
These links support speeds of up 100Gbps. But large social network companies are
deploying 400 Gigabit connections at their data centers. Moreover, telephone compa-
nies’ core networks that carry traffic between cities, states, and across the country are
achieving terabit (thousand gigabit per second) data rates.
Dedicated wavelengths on fiber-optic cabling are a high-capacity alternative to
Carrier Gigabit Ethernet. Dedicated wavelengths refer to a portion of the fiber-optic
cabling capacity, an individual wavelength, dedicated to a single customer. These often
link customers’ branch offices, warehouses, and headquarters together.
While increasing capacity on fiberoptic cables is important, it doesn’t solve
the issues of managing traffic, prioritizing applications and automating functions in
broadband networks. Wide Area Software Defined Networks (WA SDNs) are able to
prioritize applications and automate routing on broadband networks. They can be pro-
grammed to automatically route traffic away from congested routes and parts of net-
works that are completely out of service.
This flexibility and automation is due to the defining aspect of WA SDN: it is con-
trolled by software. This contrasts with earlier network protocols, which used hardware
(routers, switches, and other adjuncts) to control traffic in packet networks. WA SDNs
are a layer of software that runs on top of dedicated wavelengths and Gigabit Ethernet.
Multiprotocol Label Service (MPLS), which does prioritize voice and video, is
still used by enterprises. However, the routing is rigid and the capacity is limited. It’s
not uncommon for MPLS and WA SDN to be present in the same enterprise networks
with MPLS under the control of WA SDN.
Telephone companies, particularly in urban and suburban areas, are often drop-
ping support for older, slower, inflexible services wherever fiber-optic cabling is avail-
able. The older services, mainly T1, T3, and DSL have severely limited capacity and
less-flexible configurations than newer broadband. Moreover, it is more costly for tele-
phone companies to support them than the more flexible Carrier Gigabit Ethernet and
Dedicated Wavelength services. For these reasons, and because customers are demand-
ing higher capacities, telephone companies are phasing out T1, T3, and DSL wherever
fiber cabling is available.
As it’s difficult for organizations to accomplish their day-to-day functions when
their broadband networks are unavailable, reliability and availability are critical con-
cerns. Many customers take it for granted that because there are few network outages,
Introduction 229
their broadband networks will be available 7 days a week, 24 hours a day. However,
for large financial services companies and medical institutions, this is not adequate.
Most of these large institutions have duplicate, backup fiber-optic lines connecting
their buildings to broadband links if their primary links fail. Fiber-optic lines cut by a
backhoe or a failure in the telephone company’s equipment can cause failures.
Managed services are one way that carriers differentiate themselves from regional
and smaller competitors, who sell discounted broadband services. Examples of man-
aged services are managing Wi-Fi networks and consulting on data centers. In addi-
tion, large carriers distinguish themselves from smaller carriers by promoting their
international presence. This is important for enterprises with a global infrastructure.
A discount on mobile services is another distinguishing factor that large carriers offer
major enterprise customers to lure them away from smaller telephone companies that
may offer discounts in smaller regions of the country.
downstream and 3Mbps upstream. In 2017, the FCC affirmed the 25/3Mbps speeds,
and also asked for comments on whether this capacity is adequate for today’s needs.
Not everyone agrees with the FCC’s definition of broadband. On August 8, 2017,
FCC Commissioner Mignon L. Clyburn issued the following statement in response
to the FCC’s majority opinion keeping the definition of broadband as 25Mbps down-
stream and 3Mbps upstream. The following are excerpts from Clyburn’s statement:
The designation 1080p (1080 pixels) refers to the resolution (number of pixels) on
televisions and video conferencing. A pixel can be thought of as a dot or picture element.
1080p is the resolution generally found in high-definition transmissions to televisions.
Broadband Worldwide
A report commissioned by the Broadband Forum and conducted by the market analyst
firm Point Topic revealed that there were a total of 871.1 million fixed-broadband
subscribers worldwide at the end of the first quarter of 2017. The report covers only
broadband access over cabling and fixed, point-to-point wireless services. According
to China Money’s April 27, 2017, article “China’s Fixed-Line Broadband Penetration
Rate To Hit 63% This Year” by Pan Yue, China had 310 million broadband subscribers.
This is the highest number of broadband subscribers in a single country worldwide.
According to statistics company Statista, as of the end of the first quarter of 2017, the
United States had 93.9 million broadband subscribers. This is the second-highest num-
ber of broadband subscribers worldwide according to Point Topic.
Many people in less-developed parts of the world access the Internet primarily
over mobile services. This is because dedicated Internet access over landline networks
is frequently either not available or more costly than mobile services in these areas. In
addition, electricity is often expensive. In the Philippines, both ISP-delivered dedicated
Internet access and electricity are too costly for most citizens. Thus, mobile services
are attractive as electricity is only required for charging laptops, tablet computers, and
other devices that are equipped with mobile capabilities. Moreover, a single device can
be used to make calls and to access sites such as Facebook.
While current mobile networks support broadband services, they’re slower than
those over most wireline networks. However, new technologies and upgrades to exist-
ing standards are vastly improving Internet access on mobile networks and spurring
adoption of mobile broadband. See Chapter 7 for information on 5G mobile protocols.
VoIP Calling Services over Broadband 231
Wired Internet speeds for the premium plan (100, 200, and 300 Mbps)
were up to 70 percent slower than promised.
Exacerbating subscribers’ frustration at the time was the fact that subscribers in
many areas of the city had only Time Warner’s Internet access as a choice for
Internet access.
The Internet
messages from these three types of devices. It can also include audio and video confer-
encing. Some of these features were previously only available for large organizations
with complex, onsite phone systems.
These VoIP services enable organizations to develop a new business or service
without purchasing hardware for a telephone system. In addition, the services can be
used for businesses in which all or many of their staff members work at home or in
remote offices.
Even midsize and large organizations with their own onsite telephone systems
often use these network-based VoIP services for certain functions. One of the most
common functions is desktop video conferencing from Microsoft Teams or Google.
Desktop videoconferences are transmitted over data networks, and they typically
require nothing more in terms of equipment than the personal computers or laptops of
the participants. In particular, people working from home or traveling can participate
in these conferences, incurring minimal or no charges. Consumers and small organiza-
tions still use Skype, but large organizations are transitioning to Microsoft Teams.
lines and trunks can be tested. For instance, if there is a question with regard to where
a problem lies, the telephone company can test its trunk to the RJ21x jack, and the
equipment vendor can test service between the equipment or router and the interface.
The RJ21x jack is the demarcation point between the telephone company line and the
inside wiring.
The most common data jack is the RJ48 jack. Data trunks such as Carrier Gigabit
Ethernet terminate on these connectors. Both these jacks are at customer premises,
and they are the points at which telephone companies test trunks if there is an outage.
The most common type of high-speed trunk for incoming customer contact centers
is Carrier Gigabit Ethernet for data. Information on these services is in Chapter 4,
“Managing Broadband Networks.”
Customer premises
Router
LAN switch
VoIP phone
MPLS Implementation
When customers sign up for MPLS service, they give their provider a list of the IP
addresses associated with each site that they want included in their MPLS service.
Each IP address identifies a specific location on a network. The carrier uses this list to
define a closed group of sites that are allowed to communicate with one another over
the MPLS network. The list can be amended by notifying carriers of IP addresses to
be added or deleted.
Multi-Protocol Label Switching for Interoffice Connections 237
M
MPLS is a Layer 3 protocol that switches traffic between IP addresses
rather than Media Access Control (MAC) addresses. MAC addresses are
ra
assigned to individual computers and other devices on a network. With
a
MAC addressing the message is received at the customer end, and onsite
equipment sends the MPLS content to individual devices. By contrast, IP
addresses are assigned to the network or to the Virtual LAN (VLAN). Man-
aging fewer addresses makes routing by using MPLS with its IP addressing
less complex to manage. It also enables networks to scale to larger sizes.
MPLS is an optional feature in routers.
• A port speed at the provider’s POP, often at a lower speed than their access
line. The port speed refers to the number of bits per second that can enter the
carrier’s network.
• Additional managed services including managed security, and the use of
the provider’s network and staff for operating, setting up, and managing the
videoconferences.
• The speed of the access line, which is the circuit connecting the customer
to the provider’s network. Typically, remote offices use slower-speed
Gigabit Ethernet; higher-trafficked headquarters use Carrier Gigabit Ethernet
at speeds ranging from 100Mbps to 400Gbps. Higher-capacity services cost
more than slower services.
company. These leased lines use IP VPN technology for site-to-site links, access to the
cloud, and for remote access from:
• Branch offices
• Employees’ homes to access computer files at headquarters
• Other cities in which employees are traveling
Internet
Users work with IPsec client software installed on their computers launch the
remote access client. Client software enables access to applications located on other
computers or servers, usually in data centers or the cloud. It is supplied and licensed
by the organization that develops the IPsec software. The client software is a spe-
cial program written to interact with security software located in the data center and
cloud.
users from using stolen passwords, social security numbers, or birthdays to log into
files. Three-factor authentication might require a token ID in addition to a password
plus biologic identification. A hacker with a stolen password would most likely not
have the means to be authenticated. Authentication refers to the requirement that users
prove to computer systems that they are who they claim to be and are authorized to log
on to the network.
Security software at the user’s organization issues prompts for usernames, pass-
words, and a form or multiple forms of authentication such as:
To prevent remote users from passing viruses from the Internet to corporate
networks, the client software will often not function if there is an open connection to
the Internet while the user is logged on remotely.
using a specific port. However, even with these filtering capabilities, DDoS attacks can
congest access to the organization’s files.
Firewall ports can be virtual as well as associated with physical equipment
within the firewall. A virtual port is programmed to allow certain traffic such as VoIP
calls to pass through the firewall to its destination. A virtual port is represented in
software.
Because employees use their laptops at home to surf the Web and then bring them
into work, corporations monitor internal transmissions as well as communications
from the Internet. Many organizations program employees’ remote computers to reach
only locations on the Internet deemed secure to avoid contamination from Internet
locations that have viruses that can spread to the corporate LAN.
Firewalls don’t protect against, for example, new (black day) viruses and all
e-mail spam. Corporations often subscribe to security services that keep them posted
about new software attacks. The security software monitors their networks for unusual
amounts or types of traffic and downloads software patches for protection against new
types of attacks.
Firewalls as a Service—FaaS
Instead of supporting on-site firewalls, organizations have the option of using a
cloud provider’s firewall service. For example, a multisite enterprise may choose
to contract for Firewall as a Service rather than installing and maintaining a fire-
wall at each of their branch offices and warehouses. In these instances a service
provider’s staff maintains the firewall and keeps it updated to protect from new
viruses and new security threats.
All traffic flows through the cloud provider’s firewall rather than through onsite
firewalls. Because of their greater capacity, FaaS may be better able to protect
organizations from Distributed Denial of Service attacks because of their fire-
walls’ greater capacities and speed than many customers’ onsite firewalls.
To accomplish these goals, organizations use property data loss management soft-
ware to scan outgoing e-mail. The software is programmed to flag specific words relat-
ing to their products or services as well as key phrases or formats which indicate that
credit card data, social security numbers, or license numbers are included in a message.
Flagged messages can be manually scrutinized. To protect privacy, enterprises and uni-
versities may have policies limiting which computers store private information such as
social security numbers.
In conjunction with managed services, carriers have personnel who have expertise
in particular managed services for wireline as well as mobile networks. These include
experts in enterprise mobile devices, video conferencing, security, data centers, contact
centers, and wireless LANs (Wi-Fi networks).
Many carriers that own mobile and landline networks recognize the potential of
mobile services. Their sales staff who were previously dedicated to only landline or
only mobile products and services now sell products and services for both mobile
Digital Subscriber Line—Distance Limitations; Operates on Copper Cabling 247
and landline networks. They actively promote mobile managed services that improve
productivity such as developing applications for service organizations that dispatch
technicians to homes or businesses. When a carrier’s account staff determines that
there might be a mobile application to increase productivity, it brings in experts to meet
with its customer. After learning about the customer’s needs, these experts propose a
consulting service to develop a software application to address those needs.
DSL Limitations
On copper cabling, background noise intrudes, or “leaks,” from adjacent copper wires
(crosstalk) or a nearby electric motor (electromagnetic interference). To prevent trans-
mission degradation and speed loss, equipment on advanced DSL services constantly
monitor the line for noise. Monitoring is complex because noise can change over time.
DSL services over higher frequencies carry more bits in shorter time spans than
lower frequencies. Think of it in terms of a commuter subway system:
• If the trains don’t come very often (low frequencies), fewer people are
moved in a given span of time;
• If the trains arrive more often (higher frequencies), more people will be
moved through the system in the same time period.
248 5 Broadband Network Services
Both copper cabling used for DSL and wireless services carry signals that are
made up of wavelengths (frequencies). Low frequencies have longer wavelengths that
can carry signals over greater distances. High frequencies have shorter wavelengths
that do not travel as far, but they can squeeze more bits into each transmission.
To achieve greater capacity, DSL must use high frequencies. However, the shorter
wavelengths render high-frequency signals more vulnerable to damage from envi-
ronmental sources such as magnetic interference. At the same time, vulnerability to
attenuation (weakening and fading) means that high speeds are supported only on short
lengths of copper cabling. Some carriers use bonding to increase the capacity on DSL.
Bonding also has the advantage of increasing the length of cable over which high
frequency DSL signals can travel before they fade.
B
Bonding is the use of equipment called inverse multiplexers to increase
bandwidth by combining two or more circuits or pairs of copper cabling
b
such that they act as a single circuit. Providers that don’t have fiber in an
s
area may double the speed of DSL service by bonding two DSL circuits
together using an inverse multiplexer. See Figure 5-4 for an example of
bonding on DSL. Bonding is also used to add capacity on direct intercon-
nections to providers’ clouds. See the section “Direct Dedicated Intercon-
nections to the Cloud” later in this chapter for information on Dedicated
Interconnections.
Carrier GigE was first introduced in the late 1990s. At that time, it was not widely
available, both because it required fiber-optic cabling to the customer and because the
central offices of providers were not widely equipped with GigE switches. In contrast,
carriers now offer GigE services to small and medium-sized organizations as well as
large ones. GigE is now more widely available because more central offices have been
equipped to support it and fiber is more widely deployed to business customers. These
services start at speeds of 10Mbps and currently scale up to 100Gbps. Capacity is
expected to increase to 400Gbps in the future. Facebook and Google are experimenting
with 400 Gigabit Ethernet in the WAN.
Bandwidth demand by all types of organizations has created the impetus for car-
riers to invest in gear that meets this demand. Customers that previously used T3 ser-
vice now have either Megabit or Gigabit Ethernet. Smaller organizations can order the
slower Ethernet service of 20, 30, or 60 megabits with the option to easily upgrade
later. Moreover, most carriers including Windstream, Verizon, and AT&T have retired
all non-Ethernet services including T1 and T3 services.
40 Gigabit Ethernet
Small campuses
in other cities
100 Gigabit
Ethernet
Metropolitan Area Network
Off-campus dorms
Dedicated Wavelengths
Organizations with high-capacity requirements often lease an entire wavelength on
fiber optical cabling. The entire bandwidth of a dedicated wavelength is reserved for a
customer. It is not shared with other organizations. Dedicated wavelengths may be used
for connections to cloud services, between companies’ offices, at large data centers,
carrier hotels, and long-haul networks that run between cities and between countries.
Passive optical network service NG PON2 supports dedicated wavelength service.
For information on NG PON, see Table 4-1, “PON Standards,” in the “Appendix” of
Chapter 4. Dedicated wavelengths support gigabit and terabit speeds. A terabit is equal
to 1,000 gigabits. Dedicated wavelengths are used in 5G cellular networks to connect
small antennas to each other. See Chapter 7 for information on 5G cellular service.
In the United States, AT&T and Verizon no longer support T1 and T3. They
are gradually replacing them with Carrier Gigabit Ethernet, which is not limited to
44Mbps and has more flexible speeds, and is less costly for telephone companies to
support.
one another in networks. It is essentially the “view from the top.” Topologies include
straight lines, hub-and-spoke designs, and mesh designs.
• Fixed monthly fees Private, dedicated links are priced at flat monthly fees.
The fees are not based on minutes used or the amount of data transmitted.
• Fixed, inflexible routes Dedicated lines are not flexible. Calls and data
can only be sent between the fixed points to which the lines are connected.
Thus, communication with a site that is not on the network is not possible.
• Exclusive use Only the organization that leases private lines can use them.
For example, companies with dedicated connections to video conferencing
equipment can only hold video calls with organizations that are a part of
their private network.
254 5 Broadband Network Services
• Voice, video, and data Dedicated lines are suitable for transmission of
video, voice, and data. These services can share the same dedicated services
or they can use completely different dedicated lines.
• Fixed capacity Dedicated services are leased or built from carriers such as
AT&T, Verizon, or CenturyLink with a fixed capacity or bandwidth. These
speeds range from a low 10Gbps to higher Gigabit Ethernet speeds.
• Security GigE is used in large, private networks operated by entities such
as financial firms and the military for data communications between sites.
Some organizations feel that the extra fees and maintenance are justified.
Private networks are more secure than even MPLS networks for transmitting
sensitive military information and financial transactions.
An important factor when deciding to use dedicated services is the desire for
secure transmissions. Some firms believe that network services such as MPLS are too
public or prone to hacking for confidential applications such as funds transfer. They
want to control their own networks and have staff members available to monitor trans-
missions over these facilities. Additionally, encryption is used to further ensure privacy
and security.
• Local channels Local channels run from a customer’s premises to the car-
rier’s equipment. One local channel is required at each end of the private line
in a point-to-point circuit. Local channels are also referred to as local loops.
The incumbent telephone company often supplies local channels. Because
of limited competition for this service, pricing on these short links is often
close to the same as that for the longer inter-exchange circuit. Local channel
fees are also charged for circuits used to access the Internet, SDN networks,
and MPLS networks.
• Inter-exchange miles Inter-exchange mileage is the portion of the circuit
located within a carrier’s network. The mileage runs from the access point,
where it enters the carrier’s network, to the egress point, where it leaves the
carrier’s switch.
Organizations that lease T1 circuits for Internet access also pay for the local loop
that connects their site to their carrier. The local loop is a private, dedicated service
Network Topology on Dedicated, Private Lines 255
from the customer to the local provider. When traffic reaches the Internet, it is carried
over a shared network. The same is true for access lines to VPNs.
The shape of the network (the configuration in which lines are connected to one
another), impacts cost, the ability to scale (add or delete sites), reliability, and access to
the lines.
Consider the multipoint configuration in Figure 5-6. An application for multipoint
design is one used by utilities for communications to monitor the control equipment in
their plants. They run fiber-optic cabling on their existing rights of way, over which sig-
nals are sent. If the link to one of the large sites is out of service, the other sites cannot
reach the main location. However, in the mesh configuration presented in Figure 5-8,
if one link is out of service, traffic can be rerouted over other links. There is a trade-off
between designing and constructing the more reliable mesh networks that are more
costly and simply using a less reliable multipoint configuration.
Multipoint fiber private line connecting large sites
Small sites
Hubs connected to spokes
bit
ga
0 Gi net 100 Gigabit Ethernet
4 her Seattle
Et
Internet
Houston
Miami
Seattle
Portland Maine
Detroit
St. Louis
Los Angeles New York City
Houston
Louisiana
Miami
Enterprise needs only a single link (plus a backup link) for direct
interconnections to organizations servers at multiple cloud providers
Amazon Web
Salesforce.com Equinix or Coresite Microsoft Azure Oracle Cloud
Services
Enterprise hub at
interconnection data center
Backup link Main link
Enterprise campus
• IP networks
• Telephones connected to internal telephone systems
• Trunks that carry traffic into enterprise locations.
Large call centers that use SIP trunks have an additional benefit—the caller ID
data can be treated differently than the call itself. This is significant because it enables
the telephone system to access information differently from the call. It can send the
telephone number to a database that matches the telephone number to the customer
account number. The data network sends the account number to the agent’s terminal
to which the call is sent, which saves agents time by eliminating the need to key in
account numbers.
Call center agents
*SIP Trunk with 555-525-5678 caller ID
Voice network
Internet
Alternate route
SDN software can be located in the cloud, or at the telephone company’s data
center—within their CORD. CORD is short for Central Office Re-architected as a Data
Center. For information on CORD, see the section “Central Office Re-architected as a
Data Center (CORD)—Streamlined Central Offices” in Chapter 4, “Managing Broad-
band Networks.” Or, large enterprises may use WA SDN to manage traffic within their
own broadband networks.
WA SDNs are used to invoke commonly used operations under specified condi-
tions. For example, configurations for branch offices can also be defined and tested
centrally before being downloaded to each location. In large organizations with many
branch or warehouse locations, network configurations can be downloaded sequen-
tially to each location once there are circuits installed at the locations.
An Application Program Interface (API) is used as an interface between external
software and each device on the network that is configured for SDN. The API trans-
lates between external software on controllers and each device or service on the NFV
server. NFV is a key element of WA SDNs.
The APIs used in WA SDNs are Open APIs. Open APIs are those which can be
used by the public. They enable customers to access features in SDN from enterprises’
third-party applications. Private APIs give certain users access to only specified appli-
cations. Private APIs are most often deployed in enterprises to give access to particular
parts of their network to contractors or employees. For information on NFV see the
section “Network Function Virtualization (NFV)—Architecture” in Chapter 4.
Companies that supply hardware and software for SDNs include: ADVA, Advan-
tech, Cisco, Ciena, Citrix, Dell, Riverbed Technology, VeloCloud, Versa Networks,
and Viptela.
Network Topology on Dedicated, Private Lines 261
left corner of their building and the other fibers at the right-hand corner. In this way, a
backhaul digging up the earth that inadvertently slices fiber on one side would not cut
the fibers on the other side of the building.
However, if the organization’s telephone company equipment malfunctions, ser-
vice will be lost unless each set of fibers is routed to a different provider. Large finan-
cial institutions, large pharmaceuticals, and cloud data centers often provision fiber
with different telephone companies as a precaution in case one provider has a ser-
vice outage. Another commonly used option is to use cable TV providers as a backup
option.
Soon, 9-1-1 systems will be able to accept text messages, photos and
videos…. Some communities just don’t have the money needed to make
the upgrades.
When 911 was established in 1968, all people reached 911 call centers from their
wired, home telephone. Signaling on these calls transmitted callers’ telephone num-
bers, which were matched up with the address for each telephone number in databases.
Thus, dispatchers were able to quickly notify ambulance, firefighters, or police and let
them know the location of the problem.
With the advent of mobile phones, the location of the nearest cell tower is trans-
mitted to 911 agents. In locations where cell towers are far from each other, it’s difficult
to precisely locate the caller. The issue of location identification is challenging when
people contact 911 via text messaging and VoIP telephones as well. All of these types
of messaging are not necessarily associated with a fixed address. However, text mes-
sages are important in situations such as when a victim is hiding and does not want to
be overheard. The FCC and wireless service providers are working together to resolve
these issues. The 5G cellular protocol specifies cells with antennas close to each other,
narrowing down the location identification.
9
911 is not universally assigned for calls to emergency providers. Most of
Europe reaches Public Safety Answering Points by dialing 112, and in China
E
people dial 120 for an ambulance, 119 for firefighters, and 110 for police.
p
In Japan people dial 119 for medical and fire emergencies, but 110 to
reach the police.
266 5 Broadband Network Services
APPENDIX ..............................................................
Places Typically
Network Service Used How Used
Carrier Gigabit Ethernet Mid-size to large Access to the Internet,
1Mbps to 10Gbps over fiber commercial connections to storage area
customers networks, and LAN-to-LAN
connections; data only.
Carrier networks To aggregate traffic in
and cable TV core metropolitan networks and
and metropolitan send it as a single stream
networks to central offices or cable
headends.
Asynchronous Transfer Mode Telephone Not suited to today’s capac-
(ATM): Up to 2.5Gbps companies ity requirements. Transmits
voice, video, and data
traffic. Rarely used because
ATM switches are required.
269
This page intentionally left blank
6 The Internet
In this chapter:
Introduction 272
What Is the Internet? 273
Streaming—A Disruptive Technology 280
The Structure of the Internet 290
Security: Connected, Ubiquitous Networks—Vulnerable to Malicious Hackers 297
Privacy 306
The Impact of E-Commerce 308
Fostering Civic Participation and Engagement—Online Forums 309
Network Neutrality 311
The Digital Divide: Bandwidth, Skills, and Computers 315
Intranets and Extranets 317
271
272 6 The Internet
INTRODUCTION .....................................................
T he Internet is the single most important innovation of the 21st century. It’s a ubiq-
uitous network available in much of the world, and a disruptive technology that has
displaced many traditional retail businesses and services. It has created the perception
that the world is smaller and changed how we communicate, shop, and spend leisure
time. It has upended numerous industries, shrunk distances, led to new industries, and
enabled improved communications across countries, between countries, and between
continents. According to an international university student from China:
I am my parent’s only child, and the ability to make free video calls over
the Internet to them weekly is the thing that most helps me stay in touch
with them and share my experiences. Knowing that I will chat with them
every week makes my parents and myself less lonely.
Technologies used in the Internet are radically changing the ways consumers
access and view movies and television shows and negatively affected movie theater
attendance. People can now view high-definition movies and television on their wides-
creen TVs in the comfort of their living rooms. Many additionally have high-end audio
systems to supplement their viewing experience. Increases in the number of people
using streaming, the high video and audio quality, and improvements in actual content
have all precipitated large decreases in the numbers of adults that go to movie theaters
and lower profits for movie theaters. Attendance at movie theaters has dropped steadily
since 2016 and is expected to continue dropping as more people adopt streaming.
The Internet has radically changed how companies conduct commerce. The Inter-
net is the main vehicle by which businesses contact customers, handle customer ser-
vice, and interact with internal staff. The Internet is particularly attractive to young
people, many of whom grew up with the Internet as a part of their daily lives. Web sites
that are well designed and make it easy for customers to find what they need and to
check out, lessen customers’ desire to actually speak with or e-mail a customer service
rep. A well-designed, easy-to-use web site, an extranet, saves costs for businesses.
Extranets are online e-commerce sites where consultants, partners, and customers
access particular databases and services.
The Internet is not a single entity. It is made up of multiple large networks con-
nected to each other by routers and switches and with growing amounts of capacity
enabled by the following advancements: fiber-optic cabling, and more powerful serv-
ers and computer chips, all of which have resulted in higher-capacity broadband fiber-
optic networks.
Streaming is a major disrupter of home entertainment and pay-TV. It has been
enabled by both the Internet and home Wi-Fi. The number of people using streaming
services has grown every year since Netflix first offered it in 2007 and many ana-
lysts expressed skepticism over its future. Streaming is widely available worldwide in
What Is the Internet? 273
developed countries in Asia, Europe, the Americas, and some countries in Africa. The
rise of streaming has caused the bankruptcy of Blockbuster and other DVD retailers,
and decreased the number of people subscribing to cable TV packages. Importantly,
it’s changed the way people get their home entertainment.
Because of its acceptance, pay-TV providers now offer their own streaming
services with content they create, own, or lease. For example, Verizon owns Yahoo!,
and AOL, which they merged into their Oath unit, and AT&T, which owns DirecTV,
purchased Time Warner, the owner of HBO. Furthermore, Comcast owns NBC and
Universal, with its cache of movies and television shows. Thus, the three largest
broadband providers own and create content through their subsidiaries. This results in
competition between content providers Amazon, Netflix, and other streaming content
companies including Facebook, and large telephone, cable TV, and satellite companies
over which Amazon, Netflix, and others stream movies to homes and apartments. This
often creates a situation where pay TV providers compete with the very organizations
that stream movies and TV shows over their networks.
To prevent large telecoms from slowing down or blocking competitors’ content,
the Obama era FCC instituted network neutrality. Under network neutrality rules, own-
ers of broadband (pay-TV providers) are not allowed to slow down or block com-
petitors’ content. Cable TV providers, however, lobbied for the elimination of network
neutrality, stating that they should be compensated for carrying streaming traffic. The
Federal Communications Commission eliminated network neutrality in 2017. How-
ever, their ruling is being adjudicated in courts and in legislatures in the United States.
Worldwide connectivity has led to the challenges of keeping networks secure and
information private. Organizations, individual subscribers, and governments grapple
with keeping information secure and employees’ and customers’ personal data private.
Hackers know how internal networks are architected and where to look for vulnerabili-
ties. Furthermore, malicious employees and staff errors add another layer of complex-
ity in maintaining secure networks. Keeping enterprises 100 percent secure is almost
impossible. Hacking is profitable and not often punished. Thus, hackers have a huge
incentive to steal information they sell, or otherwise profit from illegal tampering with
businesses’ computer data and networks. It’s an ongoing race between hackers find-
ing new and novel ways to interrupt and steal information and to damage and hijack
networks, vs. enterprises and governments keeping networks safe.
or national disaster. They awarded money to the University of California at Santa Bar-
bara for the purpose of developing a resilient network. In addition, faculty in the IT
department at the University of Michigan collaborated on new protocols to be used in
the Internet.
At that time, 1969 until the mid-1990s, researchers at universities and government
agencies were the main users of the Internet. They used it to collaborate on research.
Additionally, staff at universities used the Internet to access early forms of electronic
mail (e-mail) using arcane commands such as k to display the previous message and
n to display the next message. Logging into the Internet and using e-mail acquired a
user-friendly interface when Tim Burners Lee developed the Nexus browser in 1989.
Examples of browsers include Chrome, Internet Explorer, and Safari. Mosaic and
Netscape were early browsers. Easily accessible, user-friendly browsers are a large
part of the reason that the Internet was widely adopted.
the same IP protocols to transmit data across their sections of the Internet. This means
that people access broadband in a uniform way regardless of their location. When the
Internet was designed, simplicity was purposely kept in mind so that the networks
could be uniformly and easily duplicated. The fact that these designs are accepted
worldwide has been a critical factor in adoption.
The following are examples of the Internet protocols:
• AT&T—U.S.
• Verizon—U.S.
• China Mobile—Hong Kong, China
• Nippon Telegraph & Telecom—Japan
• Softbank—Japan
What Is the Internet? 277
• Deutshe Telekom—Germany
• Telefonica—Spain
• KDDI—Japan
• China Telecom—China
• Keyhole Technologies, Zipdash Inc., and Where2 LL2 (software that forms
the basis of Google Maps)
• ITA (airline flight aggregation information)
• Motorola Mobility (mobile devices; patents for mobile services)
• YouTube (online videos and streaming TV)
• Waze GPS (global positioning service)
• Zipdash (now part of Google’s location services)
In addition to possibly skewing search results toward their own sites, search
engines have implications for privacy. Marketers can determine the following based
on terms people search on:
• Gender
• Income Range
• Health
• Type of computer (Mac or Microsoft Windows)
• Location
This information may be shared with advertisers who target ads at particular demo-
graphics based on search history. For example, they might show pop-up and sidebar
ads on the Internet based on people’s purchasing history. See the section “Privacy”
below.
that continuously and automatically crawl through the Internet looking for new and
updated sites.
and broadcast TV revenues and is a leading cause in the decline of movie theater atten-
dance as more people abandon cable TV and move to Netflix, Amazon, and YouTube
TV for movies and TV shows.
Growth in Streaming
Streaming entertainment from the Web to televisions is a key application that is grow-
ing year after year and causing losses for pay-TV (cable TV, telephone companies, and
satellite TV) providers. However, not all subscribers that stream have “cut the cord” on
all pay-TV. According to an October 27, 2017, article by Wayne Friedman in TELE-
VISIONNewsDaily, “53% of U.S broadband homes subscribe to pay TV as well as to
OTT streaming.” But streaming hours grew 100 percent from 2016 to 2017, according
to the article, “Streaming Hours Up Over 100% in 2017, Study Says,” by Alex Weprin.
The article cited Conviva for the statistics and for the statement that live sports were an
important driver of the increase.
However, in increasing numbers, subscribers are canceling their pay-TV service.
According to a September 13, 2017, Variety article by Todd Spangler, “Cord-Cutting
Explodes: 22 Million U.S. Adults Will Have Canceled Cable, Satellite TV by End of
2017,” the 22 million people that have canceled their pay service is a cumulative total
of subscribers that rely entirely on streaming options. These statistics were credited
to eMarketer. Added to these losses is the fact that growing numbers of children
and young adults are growing up assuming that they can access all their television
shows and movies on their mobile devices and computers via streaming. To wit, a
September 15, 2017, USA Today article cited statistics from Videology that 9 percent
of Millennials plan to cancel their cable TV subscriptions in 2017. This does not
include the young adults, college students, and children who already rely entirely
on streaming.
Additional studies have tracked the rise of streaming and the decline in pay-TV
usage:
• Time Warner owned the most content in the United States and Canada. Some
of its properties were HBO Films, CNN, New Line Cinema, 10 percent of
Hulu, TBS, Turner Entertainment, and Warner Bros. Animation. It owns CW
Television Network jointly with CBS Corporation. AT&T purchased Time
Warner in 2018.
• Comcast with its NBCUniversal division owns NBC, MSNBC, NBCSN,
E! CNBC, Telemundo, Bravo, USA Network, DreamWorks Animation, The
Weather Channel, 30 percent of Hulu, and Universal Studios along with
their parks and resorts. It is the largest broadcasting and cable television
Streaming—A Disruptive Technology 285
• Amazon offers free streaming for its Prime customers. Prime customers pay
$100 annually for no-fee fast deliveries, plus other privileges including free
downloads to Amazon’s Kindle e-reader.
• Facebook Watch offers sports videos, short form videos of 5 to 10 minutes in
length, and its own original content of 20- to 30-minute videos.
• Hulu offerings include content from broadcasters and access to live sporting
and other events.
• HBO Now is free to people that subscribe to their pay HBO pay-TV offerings.
• Sling TV includes content from live broadcasts plus many pay-TV channels,
and streaming sporting events.
• The Walt Disney Company has announced its intent to offer streaming chan-
nels with its own content including ESPN and 20th Century Fox’s original
content, which it is purchasing from 21st Century Fox.
• Google’s YouTube TV includes broadcast stations and pay-TV channels such
as ESPN and the Disney Channel.
Streaming Worldwide
Streaming services are available in most regions worldwide, including Europe, India,
China, North and South America, and parts of Africa. Netflix alone offers service in
190 countries worldwide. In developing countries such as India and where its available
in Africa, coding techniques used in streaming media enable users with slow-speed
mobile and wired broadband connections to receive television shows and movies
of adequate resolution. Coding techniques that use compression to shrink the num-
ber of bits enable many subscribers that would otherwise not have access to receive
an acceptable quality of streaming. According to Netflix Chief Product Officer,
Gregory K. Peters:
Cable providers and telephone companies that own local broadband facilities now
compete with companies such as Netflix with its 100 million subscribers worldwide
and Amazon Prime. Netflix and its competitors have an advantage in not needing to
build broadband infrastructure to support their services. This eliminates the significant
capital investment required to build a network, and lowers the barriers to entry into
the market. Competitors such as these are referred to as over-the-top (OTT) providers.
See Figure 6-1 for a diagram of OTT streaming. It is one impetus for people to opt for
high-speed Internet access. In a quote from Netflix CFO David B. Wells at the Netflix
2017 third-quarter investor’s conference, he says:
Time Warner’s HBO GO.com division makes no-fee HBO content available online
to cable TV subscribers of HBO. Subscribers that pay for HBO can watch any HBO
Go content streamed on the Internet. Comcast and other cable companies now embrace
TV over the Internet as a strategy to retain profits and subscribers for their pay-TV
services in the face of competition from OTT providers.
Telephone company
Equipment
Fiber transmits content to neighborhood homes and apartments
Specialized set-top boxes for streaming make it convenient for customers to receive
streamed video from the Internet. Set-top devices have interfaces that enable commu-
nications between homes’ Wi-Fi networks and televisions. The set-top boxes interface
wirelessly to home Wi-Fi networks as well televisions. The set-top box connects to the
television’s HDMI port. These set-top boxes commonly also have an Ethernet interface
to connect the TV to a residential network’s Ethernet cabling if it’s available. Blu-ray
players with Wi-Fi and Ethernet interfaces can also be used to stream content from the
Internet, as can Internet-connected TVs.
Technical Challenges
Chris O’Brien, founder of Motionbox (now part of Snapfish, a Hewlett-Packard com-
pany) and SoftCom (now part of Interactive Video Technologies), stated in a telephone
interview that
This is complicated by the fact that there is no single format that can be displayed
on devices from different manufacturers. Tablets from companies such as Apple, Sam-
sung, and Dell all use a different format, as do mobile devices that use different operat-
ing systems and are connected to mobile networks based on differing protocols.
Even using the same type of compression is no guarantee of compatibility. If oth-
erwise compatible audio and video codecs are stored in a different container (file) for-
mat, the video cannot be played. A container is a server with multiple small programs
290 6 The Internet
that share an operating system. See the section “Containers: A Newer Form of Server
Virtualization” in Chapter 1, “Computing and Enabling Technologies,” for a descrip-
tion of containers. Desktop computers with the same type of audio and video compres-
sion as iPods won’t be able to play the same video if the container format in which the
compression is stored is different.
There are a number of audio/video container formats (QuickTime, Windows
Media Video [WMV], ASF, AVI, and more), and each of these can contain a variety
of different audio and video codecs. So, for example, H.264 video with AAC audio in
an MPEG4 container might play on your desktop player but not on your iPod, even
though they both support H.264 video with AAC audio. Again, this is because they are
stored in different containers.
Edge Routers
Edge routers are located at the edge of a carrier’s network where they connect to cus-
tomers and to other routers. They are often located at Points of Presence (POPs) where
multiple providers connect to the Internet.
The edge of a network needs to support complex applications, protocols, and video.
Edge routers must support multiple protocols, including Internet Protocol version 6 and
version 4 (IPv6 and IPv4), Multi-Protocol Label Switching (MPLS), Wide Area Software
Defined Networking (WA SDNs), and complex accounting software to track packet usage
per customer. On MPLS networks, edge routers attach labels as described in Chapter 5,
“Broadband Network Services,” that include information regarding addresses, protocol,
and Quality of Service (QoS). For more information about IPv4 and IPv6 addressing
protocols, see the section “Address Structures” later in this chapter.
In addition, edge routers commonly handle aggregated Digital Subscriber Line
Access Multiplexer (DSLAM) traffic in various formats; therefore, routers need to sup-
port both newer and older variations of IP and Wide Area Software Defined Network-
ing (WA SDN). See Chapter 5 for a discussion of WA SDN.
Edge routers also use addressing information to determine how to handle the data.
See Figure 6-2 for an example of a router.
Figure 6-2 An edge router programmed with the features listed above.
These features are not present in backbone routers. (Courtesy of Cisco
Systems, Inc. Unauthorized use not permitted.)
Services on edge routers include the following (if a router is used in the core, it
does not require the extensive services listed here):
fails, it can be replaced without taking the router out of service. They are also offered
with options for duplicate processor cards and often come standard with dual power
supplies. Power supplies connect to sources of electricity. It’s also common for car-
riers to install duplicate routers that can be seamlessly brought online in the event of
a failure. Duplicate routers are crucial at the edge, where if the router fails, all other
networks and customers connected to it lose service.
Carriers that own peering points charge other carriers for connections to ports on
their routers. However, traffic at these peering centers has the potential to create delays
in the Internet if carriers lease too few ports from one another in an attempt to save
money. If carriers exchange about the same amount of traffic, they often don’t charge
one another under this arrangement. Security, routing, traffic policing, and Network
Address Translation (NAT) take place at peering points.
Address Structures
Two universal addressing schemes, IPv4 and IPv6, are used to transmit messages from
computers, smartphones, and tablet computers worldwide. The system of routing mes-
sages based on IP addresses is managed by 12 organizations that administer 13 clusters
of servers, called root servers.
The Structure of the Internet 295
Transitioning to IPv6
The main addressing scheme used on the Internet was initially IPv4. IPv4 was devel-
oped in the 1970s and addresses are only 32 bits long. On January 31, 2011, the
Internet Assigned Numbers Authority (IANA), which managed the central supply of
Internet addresses at that time, gave out the last of their IPv4 addresses to each of the
five regional Internet registries. By April 2011, the Asia Pacific region had given out
Security: Connected, Ubiquitous Networks 297
all of their addresses, and the remaining four registries distributed all of their addresses
within the next few years, Capacity is being depleted by the addition of new Inter-
net-enabled wireless devices and the growing number of Internet users, particularly
in Asia.
To ensure that they will be able to get new IP addresses, most organizations are
now transitioning to the newer 128-bit IPv6 protocol, which is capable of accommo-
dating billions of additional addresses. Most carriers have transitioned to IPv6. The
IPv6 IEEE standard was published in 1998.
Most new routers, web browsers, and computers are compatible with both IPv4
and IPv6. The transition to IPv6 can be complex because it means assigning new
addresses to every device with an IP address, including routers, firewalls, network
management software, and all servers, including e-mail servers. In addition, it’s
not a simple matter to determine which applications and devices are compatible
with IPv6. Enterprises that transition to IPv6 often need to be able to handle mes-
sages that are still in the older IPv4 scheme. Encapsulating IPv6 addresses within
IPv4 can address this problem. There are also software packages that support both
protocols.
E
Extradition treaties are agreements between countries whereby a country in
which a crime took place can receive permission to bring criminals back to
w
trial in the country of their suspected crime.
tr
298 6 The Internet
• Phishing emails
• Stolen passwords
• Weak Wi-Fi security
• Incorrectly configured software
• Unpatched software applications with known vulnerabilities
• Ransomware that encrypts organizations’ computer files, making these files
unreadable
• Distributed Denial of Service where massive amounts of hacker traffic block
legitimate users’ access
Resistance to Hacking
Resistance to hacking is an important way to safeguard private information about person-
nel, customers, and intellectual property containing product and software designs crucial
to organizations’ business success. Firewalls are one way organizations screen incom-
ing traffic for known viruses. Firewalls are software- or hardware-programmed to block
incoming known viruses and malware. In addition to firewalls, organizations typically
have specialized appliances with security software that identifies and blocks malware.
Because of the criticality of security, large and medium-sized organizations hire
Chief Security Officers and specialized security staff that monitor incoming and
outgoing traffic to keep information secure. The jobs of Chief Security Officers and
their staff are increasingly complex due to the fact that employees now access orga-
nizations’ data stored on the cloud, at hosting centers, and branch offices, as well
as at company servers and computers. Staff access this data from mobile as well as
Security: Connected, Ubiquitous Networks 299
landline devices and from remote locations as well as from headquarters. There are
multiple places where viruses can infect internal networks. To protect data stored in
the cloud, organizations use a combination of, for example, Amazon cloud security
software and/or security software designed to operate in the cloud. Security software
can additionally be located on servers to protect particular applications and at remote
branch offices.
Other inadvertent security lapses caused by insiders include lost laptops, smart-
phones, tablet computers, backup disks, or flash drives containing files with medical
and demographic patient data or other private or strategic information.
User training is an important strategy toward preventing inadvertent security
breaches and in gaining the cooperation of employees in adhering to corporate prac-
tices. If employees understand the crucial nature of lost data, they might take extra
precautions to protect it. This can include measures as simple as not taking strategic
information out of the organization, reporting losses immediately, and not leaving
passwords on sticky notes under keyboards. They will also be more careful in not
allowing unauthorized outsiders entry into the organization. This can be something
as fundamental as not allowing people without badges to walk into secure areas
behind them. Another point that should be stressed is not leaving unattended com-
puters active so that other users have access to strategic information and e-mail mes-
sages. To prevent this, some organizations configure their computers to time out and
enter a password-protected standby mode if they are inactive for a specified amount
of time, or they institute rules that all employees must shut down their computers
at night.
Responding to an Attack
To limit damage from malware, organizations use security software to monitor all
incoming and outgoing traffic. Security software is able to issue alerts to specified
telephone or mobile numbers, or send e-mails to security staff. Once alerted, staff can
take action against the attack. For example, infected computers and servers can be
taken offline until the malware is erased from all hard drives and disks connected to it.
Many organizations use Intrusion Detection System (IDS) software or devices to
monitor traffic and attempt to block Distributed Denial of Service attacks of millions
messages meant to block legitimate incoming traffic. These systems monitor packets
for malware and report them. Intrusion Detection and Intrusion Prevention Systems
(IDPSs) attempt to stop these attacks as well as identify and report them. Often these
types of software can divert the attacking bits to a part of the LAN separated from
legitimate servers and computers. However, this is one of the most difficult breaches to
protect against as automated bots, short for robots, are programmed to send millions
of simultaneous strings of data to enterprises. This makes the network unavailable to
legitimate incoming and outgoing traffic.
Security Software
Security software can be embedded in virtualized servers and containers with other
applications or in a standalone appliance (a computer with a dedicated application).
302 6 The Internet
E
Encryption is the use of mathematical algorithms to make files unreadable
except to users who have the software, the key, necessary to decrypt the
e
files. Encryption is also used on files transmitted between corporate sites
and between remote staff and their offices.
Block Chain
Block Chain is new a security protocol now being tested to manage data, track
assets, and process financial transactions between banks. It is a distributed proto-
col without a central entity managing the interactions between nodes (comput-
ers). All data transmitted is encrypted when it is sent and decrypted at each node
through which the data passes. All nodes along the transmission path must verify
the data is not spam or fake in any way. Block Chain is made up of three main
components: a network of computers, a protocol, and a way to reach consensus.
Block Chain is envisioned for tracking assets and shipments, and for money
transfers between banks. It is also the basis for digital cryptocurrencies. In tests
of financial transactions between clearing houses, transactions that formerly
took 3 days to complete, were done in just seconds.
Continued
Security: Connected, Ubiquitous Networks 303
Other applications for Block Chain include tracking assets within organiza-
tions and payments between people and institutions; all can be completed
without a central clearinghouse. Block Chain transactions and tracking are
done through the use of a ledger, which has copies of all transactions and
merchandise tracking steps. Each node (computer) in the chain of com-
munications has a copy of the entire ledger and takes part in verifying each
transaction.
One challenge in implementing Block Chain is that all of the nodes in each
transaction need to be based on compatible network operating systems,
network protocols, and back-office systems. Cryptocurrency tokens that are
used for financial transactions include Bitcoin, Zeash, Monero, Ripple, and
Ether.
Block Chain is architected in a mesh configuration with all nodes and institu-
tions able to communicate with each other without a central entity managing
the interactions. Each node verifies and authenticates the data as it is transmitted
through networks. Platforms that use Block Chain operates on include Ethereum,
Cardano, and Shuttle Fund.
It’s likely that there will be additional applications for Block Chain, which is a
security protocol. It’s not known what the future of cryptocurrencies is.
An additional way to guard corporate data is a need to know policy that allows
employees to access only applications that they need for their job. Other strategies
include setting up rules such as not allowing the use of thumb drives in USB ports on
computers, and building in alerts if a thumb drive is inserted into a staff person’s com-
puter. In addition, security staff can revoke all passwords and access to files as soon
as a person’s employment is terminated. Some organizations have security personnel
walk fired staff or staff that quit their job out the door to ensure that they don’t take
company computers and/or files with them when they leave.
North Korea, and Russia. Thus the hackers originating attacks from these countries
don’t necessarily face trials and legal actions for their crimes of hacking into orga-
nizations in Europe and the Americas. Many of the hackers in these countries have
the blessing of their government to steal data useful in manufacturing or weapons
development.
When a hacker is brought to trial, building an airtight case is challenging. Hard
drives containing viruses must be preserved exactly as they were following the attack.
Computer forensics, evidence on computers, and storage systems must be conserved
and presented in court. Any evidence of tampering with the evidence can invalidate the
court proceeding.
PRIVACY.................................................................
Privacy is the ability of people to control who sees information about them. It includes
the ability to not share private information such as social security numbers, birthdates,
job applications, and medical information. Privacy often conflicts with merchants’
desire to use personal data for business purposes.
For example, information about consumer buying habits is a source of valuable
information for advertisers who purchase ad space on the Internet. However, it can also
create issues for people concerned about privacy. Software used by marketers is able
to add small software files to browsers. These software files track which sites an indi-
vidual visits. For example, if a user clicks an ad containing a video that uses Adobe’s
Flash or HTML5, the advertiser can compile a list of sites that he visits after clicking
the ad. With this information, it can display ads based on what these habits suggest
about his interests. For instance, advertisers might display ads about sporting events to
people who visit sports-oriented sites.
When a shopper purchases, say, a skirt online or even browses for skirts, advertis-
ing networks can automatically display ads about these types of clothing to the pur-
chaser when they visit other sites. In addition, information gathered in this manner
from social networks is a powerful way to attract advertisers. In turn, advertising net-
works that use bots, small programs programmed to automatically collect information,
place ads at many different sites and help amass large databases of demographic infor-
mation about users’ browsing and purchasing habits.
Another way that marketers collect information about users is from online games
on social networks such as Facebook. Every time a Facebook member downloads a
game application, the game developer acquires information about the game player.
Developers track the user’s data, compile it into lists along with information about
other users, and then sell the data to marketers.
• Connected TVs that send data on Internet links on which viewers click. In
2017, the U.S. Federal Trade Commission (FTC) fined television manufac-
turer Vizio $2.2 million for collecting information about customers’ viewing
habits without first getting their permission.
• Overhead drones are able to collect data using sophisticated long range
cameras.
• Credit bureaus have massive amounts of information about people. In the
Equifax security breach made public in 2017, 143 million personally identifi-
able Social Security numbers were stolen.
• Automated toll scanners have the ability to track where cars have traveled by
scanning license plate numbers.
• Late model cars with diagnostic software are able to track cars’ routes and
owners’ driving habits.
the store. Facial recognition is used to match individual shoppers with their credit
card data on their mobile phone. In contrast, Wal-Mart has closed stores, built up its
e-commerce web site, and purchased Jet.com, presumably as a vehicle for distributing
products ordered online in the United States. In 2018 they acquired Flipkart Pvt Ltd,
the largest online commerce site in India and an Amazon competitor there.
Currently, the Amazon Go store is not available to people without a smartphone
with a credit card associated with it. Roughly 67 percent of the population had smart-
phones by early of 2018 according to consulting firm Statista. But, per Statista only
23.16 percent of retail sales were paid for using mobile payments.
The following is a quote from the moderator, Linda Dunbrack, who estab-
lished the Frambors, Framgov, and Nobscot Neighbors online forums after the
founder of the original forum died. At that point maintaining the forum founder’s
server was no longer feasible. The statement was written when the forums were
established.
Creating the policies that govern it are critical. On Frambors, Framcom, and Nob-
scot Neighbors, the policy is that posts may not make personal slurs about another
person that has posted a comment. Another example of such a policy decision is that
all messages must be signed in the body of the message. This is different from the
comment sections of newspaper articles where virtually all messages are anonymous
and people feel free to say anything that’s on their minds, often with little consider-
ation. On the one hand, signing can inhibit those people who are uncomfortable with
the loss of their anonymity, resulting in lowered written participation. On the other
hand, signing messages has resulted in changing the whole tone of the conversation;
civility, care in detail, and a number of other subtle characteristics all contribute to a
marked degree of integrity in the list as a whole. The moderator of each forum first
warns, and then disallows people from a list in which they post disparaging remarks
about a specific person.
Network Neutrality 311
During the Obama presidency, the primarily Democratic United States Federal
Communications Commission (FCC) enacted the above network neutrality rules for
wireline and mobile companies.
The two main issues around network neutrality are that some large ISPs such as
AT&T, Comcast, and Verizon control networks throughout the USA and sell mov-
ies and television content. Comcast acquired content through its partial ownership of
Hulu, and its 2011 purchase of NBC Universal. Comcast and AT&T transmit Netflix,
Amazon, and Roku’s content. These companies are competitors with whom these and
other ISPs compete to attract streaming customers. Moreover, the merger between
AT&T and Warner Brothers means that AT&T owns content including HBO and HBO
NOW. Thus, they too will compete with streaming companies.
Today, the future of our open, thriving internet has been secured. The
nation’s top consumer protection agency now has jurisdiction over
fairness and neutrality across the Internet; ensuring consistent rules
apply to all players, including the most powerful online companies. And
America’s broadband providers—who have long supported net neutrality
protections and have been committed to continuing to do so—will have
renewed confidence to make the investments required to strengthen the
nation’s networks and close the digital divide, especially in rural com-
munities. It’s a great day for consumers and our innovation economy.
The major carriers are in favor of eliminating network neutrality. They want to be
compensated for upgrades to their networks to accommodate increased traffic. Currently,
Network Neutrality 313
most wireline access in the United States offer tiered unlimited plans for residential
customers. Thus, most of these customers have no incentive to cut back on streaming
because they pay a flat fee for broadband capacity however much capacity they use.
Zero Rating
Zero rating is the process whereby ISPs and cellular providers exempt consum-
ers from data fees and data caps for certain services, including unlimited video
streaming. Carriers sometimes exclude their own content from data caps limits
or fees for data. This is what AT&T instituted when it eliminated data caps from
its DirecTV service. In a similar vein, Comcast eliminated data caps for its
Stream TV service.
Another instance of zero rating is AT&T Mobility’s 2012 announcement of a plan
to shift some of its data network costs to developers whose customers generate
the traffic. Under the plan, developers will have the option of paying fees to
AT&T Mobility for cellular traffic generated by their applications. The applica-
tions for which developers pay usage fees will not count toward customers’ data
plans. Critics of the plan charge that it favors established developers that can
afford the fees, which results in free usage for their customers.
314 6 The Internet
The digital divide in the United States is decreasing in part because of the use of
fixed wireless technologies in rural areas. AT&T, CenturyLink, Verizon, and Frontier
all have stated their intention to increase broadband capacity in rural areas using new,
higher capacity fixed wireless. See Chapter 7, “Mobile and Wi-Fi Networks,” for infor-
mation on fixed wireless technologies. However, according to Pew Research Center’s
2016 surveys, the digital divide in the United States is most pronounced in:
• Minority populations
• Groups with lower incomes
316 6 The Internet
Intranets
When they were first developed, intranets, which are based on web technology, served
as repositories of centralized information. Intranets are still a single source of an orga-
nization’s information. However, they are now as a whole better organized so that
employees can find what they are looking for faster. Clear organization of information
is an important area where intranets can excel. In large organizations this is not always
the case, as some departments do not always update intranets with the latest informa-
tion. Having management to which the intranet is important creates a culture where
departments update their intranet when needed. Examples of intranet software include
Facebook’s Workplace collaboration and networking software, Microsoft’s Teams,
Axero, Jostle, MyHub, and Intranet Connections.
Collaboration where people in distant offices can work jointly on projects and
reports is an important way to improve productivity. Some additional intranet func-
tions include:
• Checking whether user applications need updating and that all security
patches are in place when employees log on to the intranet
• Managing human resources functions such as accessing pay stubs and
appraisals, making changes to tax forms, changing user addresses, and
selecting benefits
• Enabling the ability to submit time cards and expense reports on the intranet
• Making available corporate documents, such as organizational practices,
required documents, templates for résumés and sales proposals, technical
magazines, and corporate directories
• Establishing wikis with information about particular technologies or work-
related information
Because of security concerns, many extranets are located at web hosting sites.
The hosting company’s customer has his own computer at the hosting company. High-
speed Carrier Gigabit Ethernet capacity lines connect the hosting company to the
Internet backbone. Companies often remotely upload or download information to their
host-located computer via Carrier Gigabit Ethernet. Online learning is an example of
an extranet service. It provides web-like access to educational material for school staffs
and students. This is an advantage to schools that offer it because it enables them to
offer their courses to students that are not within commuting distance of the college or
university. In addition to supplying extranet software, online-learning companies offer
to host the application at their own site.
This page intentionally left blank
7 Mobile and Wi-Fi Networks
In this chapter:
Introduction 322
Spectrum for Wireless Networks—A Critical Asset 323
More Efficient 4th Generation Digital Networks 333
LTE—The First True 4th Generation Cellular Protocol 336
5G Mobile Networks—Small Cells; Additional Capacity 359
The Internet of Things—IoT 362
Applications and Services 366
Wi-Fi Standards, Architecture, and their Use in Cellular Networks 368
Satellites—Geosynchronous and Low Earth Orbiting 380
Appendix 382
321
322 7 Mobile and Wi-Fi Networks
INTRODUCTION .....................................................
M obile devices are a central part of many people’s lives. This is especially true of
young people. When graduate students at a university were asked if they agree with the
following statements, the majority of them agreed.
Some students stated that they check their phones 15 and more times every hour.
Young people and not-so-young people use their phones for online gaming, video
streaming, and social networks. It’s an integral part of their day. High usage is not
confined to teenagers and twenty-somethings. It’s an important part of everyday life
for much of the population.
Growing capacity, availability, and ease of use enable adults as well as twenty-
somethings to use cellular networks for an increasing number of functions. People
use these networks to stay in contact with friends and family, receive email and text
messages, and keep up-to-date on news. While waiting for an appointment in a doc-
tor’s or dentist’s office, most people use their device to make the time pass faster. And
people that travel often bring tablet computers on airplanes and train trips to watch
downloaded videos.
The increased use of smartphones and tablet computers has created pressure on
mobile carriers to add capacity by upgrading their networks to protocols that enable
them to pack more traffic on the airwaves that carry wireless voice and data.
In essence, mobile networks are becoming densified, meaning cell sites with anten-
nas and adjunct equipment are spaced closer together with each supporting higher
data rates. Densification requires adding new cell sites to support gigabit data rates
achievable with upgraded Long Term Evolution 4th generation (LTE) networks and
new 5th generation mobile protocols. Densified wireless networks are architected with
fiber-optic cables that connect heterogeneous networks (HetNets) together. The name
HetNets is derived from the fact that HetNets are made up of cell sites with various
amounts of coverage and antenna sizes.
There is additionally more usage over Wi-Fi networks inside homes, cafes, and
buildings as people increasingly use smartphones and tablet computers for video stream-
ing, reading newspapers, and accessing social networks within buildings. There are new
and emerging protocols that support gigabit data rates and improved security in Wi-Fi
networks. The same phenomenon of large increases in wireless usage is occurring inside
Spectrum for Wireless Networks—A Critical Asset 323
buildings and homes as in cellular networks in wider outdoor areas. In many residences,
it’s not unusual for each person to have multiple devices with many in use simultaneously.
Satellites along with ground-based wireless networks are being designed and
upgraded to support broadband services in areas with sparse availability of high-capacity
cellular networks and broadband networks. In particular, low earth orbiting satellites
(LEOs) that orbit closer to the earth than traditional satellites are being deployed. LEOs
are made up of smaller, less costly satellites than traditional satellites. Because they are
lower in the sky, more LEO satellites are required to cover the entire earth. However,
even at the lower price, it takes a group of investors to raise additional funding to build
these high-cost satellite networks.
The requirement for new satellite networks, 5th generation mobile network infra-
structure, and upgrades to LTE mobile networks require ongoing investments. The same
is true of infrastructure and protocol development in Wi-Fi networks. Moreover, the chal-
lenge of operating these complex networks is sparking an interest on the part of providers
to use cloud-based services to manage the large numbers of dense network components.
Radio Wavelengths
Long wavelength,
low frequency
Short wavelength,
high frequency
Spectrum Blocks
Governments allocate spectrum in chunks of frequency bands that are measured in
ranges of, for example, 12-, 15-, 22-, and 30MHz. The size of the spectrum band is
determined by subtracting the lowest frequency of the range from the highest fre-
quency (highest frequency minus lowest frequency). For example, if an organization is
granted the rights to use the spectrum band from 785MHz to 800MHz, it has the right
to a 15MHz band (800 – 785 = 15).
Spectrum bands, which are set aside for specific services, are divided into blocks
designated by letters of the alphabet. For example, within the 700MHz band (between
700MHz and 799MHz), the A block refers to a different block or range of frequen-
cies within this larger range of frequencies than the B Block. The A Block might be
allocated to one carrier in a region and the B Block to a different carrier for compet-
ing services in the same region. As new technologies are developed, certain spectrum
bands are used for shared spectrum. With shared spectrum, sophisticated protocols in
antennas send signals around signals from other traffic.
• Uplink (UL) transmissions are those from subscribers to carriers’ antennas, and
• Downlink (DL) transmissions are those from the carrier to the subscriber.
326 7 Mobile and Wi-Fi Networks
The goal is to enable equipment compatibility so that customers can more easily
use their mobile devices on other networks. Mobile devices have preset designations
for which frequencies are used for uplink and which are used for downlink communi-
cations. Thus, they only work on networks that use the same bands within frequencies.
The 3GPP specifies other bands, such as 12 and 17, for either uplink or downlink
transmissions. Not all technologies require separate frequencies for uplink and down-
link communications. In these instances, numeric designations are not required.
To ensure that entities that purchase spectrum use it for actual mobile networks,
the FCC has ruled that carriers and other winners of spectrum must use their spectrum
within 12 years. If it’s not used within this time frame, the FCC can reclaim the idle
spectrum. This has not stopped spectrum owners from selling their spectrum at huge
profits to cellular networks before the 12-year deadline.
In fact, the FCC did require that FiberTower return all of its 24GHz that it won,
but on which it did not build infrastructure. It allowed FiberTower to keep its other
spectrum. See below for information on AT&T’s purchase of FiberTower.
F
Fixed Wireless to the Home (WTTH) is the use of cellular service at homes
for broadband service. Fixed wireless requires dishes at subscribers’
fo
homes and equipment on telephone poles for access to the Internet. It
h
also requires a small converter box to convert the cellular signals to those
compatible with the residence’s Wi-Fi signals.
The CCA was quoted in a FierceWireless article on January 19, 2018, by Mike
Dano, titled “AT&T to lose hundreds of 5G millimeter wave licenses as part of
FCC/FiberTower settlement.” The CCA stated “If the pending transaction [between
AT&T and FiberTower] is approved, the terms of the settlement agreement will
afford FiberTower a financial windfall for sitting on unconstructed licenses for
years and AT&T a windfall to acquire valuable 5G spectrum.” The FCC approved
AT&T’s purchase of FiberTower on February 12, 2018.
Homes in a rural area with wireless broadband for Internet access. Each home is connected
directly to the mobile telephone company’s antenna.
Mitigating Interference
When transmissions use the same frequencies in the same locations or even next to one
another, they can interfere with one another. For example, if people install Wi-Fi wire-
less equipment such as cordless telephones as well as microwave ovens that operate at
2.4GHz near each other, they may experience operability problems. These problems
are caused by interference. Newer wireless protocols have the ability to hop between
channels when they sense that other signals are in the same channel.
Concerns about interference often lead to political conflicts between factions.
This can occur when new uses for spectrum or new technologies are proposed. This
occurred, as illustrated in the next section, when it was first proposed that white-space
spectrum be allocated for other uses and also when LTE U was proposed. See Table 7-2,
“LTE Types.”
Devices that emit high power may interfere with nearby devices. Moreover, the
government can designate bands of spectrum as unlicensed for public benefit.
In 2010, the FCC designated licensed spectrum formerly used in conjunction
with analog TV as unlicensed spectrum to lower the cost of bringing new broadband
services to rural areas. When broadcasters changed from analog to digital television
broadcasts, The FCC auctioned off most of the 6MHz of that spectrum formerly used
as guard bands for analog TV and still used for wireless microphones.
Guard bands, also called white spaces, are unused bands of frequencies surround-
ing each channel that prevent wireless signals from adjacent analog channels from
interfering with one another. Wireless signals are not enclosed in cabling, and thus can
leak or spread into adjacent spectrum. Analog signals leak more than digital signals.
For this reason, when the FCC originally allocated spectrum for analog television, it
set aside 6MHz of spectrum as guard bands between all adjacent TV channels.
When the FCC announced its desire to make these white spaces available for Long
Term Evolution (LTE) because they were no longer used as guard bands, broadcasters
and Broadway theater producers objected. They were concerned that new services in the
spectrum might interfere with microphones and other equipment used at public events
such as those in stadiums, concerts, and even churches. After extensive testing, includ-
ing an experimental license granted in a small rural town, the FCC ruled that the former
white spaces could be used as unlicensed spectrum. It ruled that it could be used for
“super” Wi-Fi, a Wi-Fi standard whose signals can travel over longer distances than tra-
ditional Wi-Fi signals. “Super” Wi-Fi is the informal name for the 802.22 IEEE standard.
The FCC hoped that this spectrum would be used to bring high-speed Internet
access to rural areas. Making the spectrum unlicensed further supported the goal of
lowering the total cost to bring Internet access to rural areas. Because this spectrum
is in the 700MHz range, which is a low frequency, the signals can travel the distances
required in rural areas. Using wireless obviates the need to lay fiber-optic cabling and
install costly electronic equipment near customers or directly to premises.
locations where a subscriber’s mobile provider does not offer service. Roaming is
important because no single carrier has coverage everywhere. Roaming is a profitable
source of revenue in many parts of the world. Exceptions to this include within Euro-
pean Union countries, most cellular providers for traffic within India, and depending
on each customer’s plan, traffic within the United States.
In June of 2017, the European Union eliminated roaming surcharges for residents
of the EU that travel within EU countries. Another example of no-cost roaming is
T-Mobile, which offers customers on certain plans no-fee texts, voice, and data usage
when they roam in 140 countries internationally.
Agreements among carriers are required for every region in which roaming is
enabled. Roaming agreements spell out costs, billing, and payment terms. To illustrate
the complexity of roaming arrangements, most carriers have agreements with 200 to
250 other carriers. Some carriers use brokers that already have agreements worldwide
and share revenue with the broker. Thus, calls made and received while roaming are
more expensive than those in the subscriber’s home territory; with the additional costs
covering the fees imposed by the other network.
Once the agreement has been signed and the service tested, roaming is activated.
Carriers lease high-speed links to other providers such as AT&T, France Telecom, and
Belgacom (in Belgium), all of which have an international presence. These links carry
the actual voice and data traffic. Signaling links are also established to perform functions
such as the handshake between the handset and the user’s home carrier. The handshake
verifies that users are legitimate customers of the originating network and have roaming
privileges. Gateways are used to translate signaling between handshakes that use incom-
patible types of Session Initiation Protocol (SIP) links over which the handshake is done.
Roaming revenues are shrinking because many customers use Wi-Fi in cafes and
hotels when they travel internationally. For more on Wi-Fi international networks see
the section “Wi-Fi for Roaming” later in this chapter.
air between handsets and an operator’s equipment. See Table 7-1 for a list of the main
mobile protocols along with the various implementations within each generation.
Unlike 3rd generation protocols, which used different technologies in Europe and
parts of the United States, 4G LTE is for the most part is implemented uniformly
throughout the United States and Europe, as well as in Asia and parts of Africa.
3G standards had various releases or revisions, which improved upon and increased
capacity and suitability for mobile networks capable of carrying voice, video, and data.
However, even in these revisions, voice is transmitted using the less-efficient circuit
switching where spectrum that could be shared with data is set aside for voice. More
information on 3G and 3G standards are in Table 7-6 and Table 7-7 in the “Appendix.”
In 4G networks, voice is carried in Internet Protocol (VoIP) packets on the same spec-
trum as data.
3G protocols are still available in even advanced networks because there are still
older phones that are compatible with only 3G and not 4G protocols. Once mobile
providers find that a large majority of subscribers have phones compatible with newer
protocols, 3G spectrum will be refarmed (repurposed) for 4th and 5th generation cel-
lular services. Refarming refers to using spectrum previously used to carry older gen-
erations of traffic to use with 4th and 5th generation protocols.
Table 7-1 Main 3rd, 4th, and 5th Generation Cellular Service
Generation Variations Where Used Characteristic Transmission
3G** CDMA (Code Implemented by Data carried as Voice transmit-
Division Mul- Sprint and Veri- digital bits ted on separate
tiple Access) zon in U.S. and spectrum
in South Korea
& other Asian
countries
WCDMA Implemented in Data carried as Voice transmit-
(Wideband Europe and most digital bits ted on separate
Code Divi- of the rest of the spectrum
sion Multiple world
Access)
More Efficient 4th Generation Digital Networks 335
3G Technologies—Incompatible Standards
The International Telecommunications Union (ITU) defined IMT-2000 (International
Mobile Telephone) digital standards for 3rd generation voice and data on cellular net-
works. Unfortunately, the ITU subcommittees endorsed several different, interoper-
able 3G techniques due to political pressure from operators and manufacturers who
wanted standards to more closely match the equipment they produced and used in their
networks.
The two main standards organizations, 3rd Generation Partnership Program (3GPP)
and 3rd Generation Partnership Project 2 (3GPP2), specified non-interoperable
protocols and architectures (the way devices are connected together and
interoperate). 3GPP (3rd Generation Partnership Project) is a collaboration agreement
formed by European, Asian, and North American telecommunications standards for
cellular protocols.
See Table 7-6 in the “Appendix” for more details on 3G networks.
• Data rates of 100Mbps downlink (from the network to the user device) for
mobile devices such as those in cars or trains, and 1Gbps downlink speeds
for low-mobility devices. Low mobility refers to devices used in fixed loca-
tions or portable only within a building.
• Internetworking with services based on international mobile telecommuni-
cations (IMT), earlier 3G protocols, and with services transmitted on fixed,
landline networks.
• An all-IP packet infrastructure.
• Internet Protocol version 6 (IPv6) addressing, which has more addresses
than IPv4. See Chapter 6, “The Internet,” for information on IP addressing.
See the section “Addressing Protocols” in Chapter 6 for information on IPv6
and IPv4.
• The ability to support mobile TV.
• Efficient use of spectrum.
• Worldwide roaming compatibility between mobile 4G devices.
Internetworking refers to the fact that 4G devices can seamlessly be handed over
between cell sites that use 3G and 4G protocols without transmission interruptions.
See Figure 7-3 for an example of a handover between 3G and 4G networks. Handovers
are the process that occurs when subscribers travel between networks that support
different protocols.
LTE—The First True 4th Generation Cellular Protocol 337
Billing, text
messaging databases Signaling gateway Signaling gateway
LTE Capacity
LTE (Long Term Evolution) supports web surfing, mobile broadband, and Quality of
Service (QoS) for video streaming. QoS saves a path in the network for each video
transmission for the entire duration of the video. This provides the consistent ser-
vice required for video. True IMT-Advanced, 4G LTE, based on Release 11, supports
100Mbps downloads, and is available in much of the world.
LTE is not a one-flavor protocol. It has evolved into a true 4th Generation protocol
with variations. These variations are listed in Table 7-2, “LTE Types.” Each variation
operates on specific spectrum bands and is suited for particular applications such as
low-speed Internet of Things (IoT). Another LTE variation is suitable for fixed WTTH
in areas with no fiber or high-speed Internet access to homes.
Coaxial cabling connects the eNodeB to the cell site’s antenna. The eNodeB con-
tains a blade with a software-defined radio containing the air interfaces tuned to the
applicable spectrum. A blade is a densely packed, horizontally placed circuit board
with many ports. The modem in the software-defined radio translates radio frequency
signals into those compatible with landline networks, and vice versa for outgoing
traffic.
The eNodeB is also referred to as the base station. Together with the antennas,
amplifiers, and spectrum, it is used to access the mobile network. In combination, this
equipment and spectrum make up the Radio Access Network (RAN). The eNodeB
manages the RAN.
LTE architecture is streamlined in terms of the amount of equipment and protocols
required compared to earlier generations of mobile networks. Figure 7-4 presents a
diagram of LTE architecture. This streamlining and distribution of functions at fewer
servers results in data stream transmissions that use fewer protocols and equipment
hops. This decreases latency (delays).
The LTE evolved packet core is a data center that
supports multiple antennas and controllers
Broadband
Network
Internet
Signals
Voice & data traffic
Packet Gateway
PGW**
A backhaul network is made up of traffic from cell sites that is aggregated and
transmitted to the core.
Provider’s Data
Backhaul Center with Core
Functions*
In the United States, most providers have upgraded much of their backhaul net-
work to fiber. In areas of the country and worldwide where fiber is not already installed,
LTE—The First True 4th Generation Cellular Protocol 341
• The RAN is the only wireless part of mobile networks. This is the link
between the user device and the antenna or tower. A base station located
adjacent to the tower or antenna is dubbed an e-NodeB.
342 7 Mobile and Wi-Fi Networks
• The backhaul “hauls” traffic to the core from the RAN and vice versa. It is
made up of fiber-optic cabling or high-capacity microwave.
• Fronthaul is the fiber link between antennas in Heterogeneous Networks
(HetNets) LTE and 5G architecture in which small cell sites are linked to
larger macro cells with fiber. The fronthaul is the fiber linking the small cells
to the macro cell within the same area. These cells are controlled by base
stations at the macro cell site. See the section “Heterogeneous Networks—
Architectures for Densely Trafficked Areas” later in this chapter for informa-
tion on HetNets.
• The evolved packet core is the mobile providers’ data center with routers
and software for signaling systems to manage mobile traffic and identify cell
phones’ owners
• Transmitting traffic to the other networks
• Converting mobile traffic to be compatible with wired networks
• Billing and tracking
• Tracking roaming by users
• Tracking and identifying applications using Deep Packet Inspection, which
identifies bits inside packets
Router
M
Mobile switches and the large amounts of fiber-optic cabling are critical
parts of all mobile networks and they all depend on power to operate.
p
Mobile networks are not immune to power outages caused by storms and
M
natural disasters. Lightning strikes and snow emergencies are particular
challenges because they can knock out electricity to switches and cell
sites. Outages can occur at cell sites not equipped with a back-up genera-
tor. Not all carriers have adequate backup. Some have battery backup for
momentary power glitches and short outages lasting only a few hours.
Adequate backup is a growing challenge because of the increased number
of small cells and natural disasters.
to data networks, the Internet, other mobile carriers, and other cell sites within the
carrier’s mobile network. Equipment and software located in the core also perform
signaling and tracking calls for billing purposes.
A key factor in improved functioning is LTE networks’ flexibility in handling
voice and data is the fact that signaling messages are carried separately from user data
and IP voice. Signaling messages are used to keep track of usage, perform security
functions (to keep the network free from hackers and malware), authenticate users, set-
ting up a session (voice, data, or video) and enforce policies. Policies include rules on
the number of bits included in various data plans. Signaling enables carriers to monitor
this volume so that a message can be sent to the user’s device, notifying him that he
has used up his planned quota and will be charged extra for additional transmissions.
Functions within the LTE evolved core network are divided into three functional
elements. The evolved packet core contains servers for managing these elements. Two
elements, the Serving Gateway and the Packet Data Network Gateway, are generally
located in the same router. The functional elements making up the LTE’s IP core are
as follows:
The PGW and SGW transmit mobile traffic to the Internet and other data net-
works. 3G traffic is handed off to these LTE gateways by earlier-generation controllers
and signaling gateways. Note that Voice over LTE is outside of the evolved packet core.
LTE—The First True 4th Generation Cellular Protocol 345
Traditional Voice
300 to 3400 Hz
High-Definition Voice
50 to 7000 Hz
IP
Multimedia
Subsystem
IMS
Databases Router
Firewall connects to
IMS &
broadband Internet
networks
C sites are the costliest part of mobile networks because there are large
Cell
numbers of cell sites in 4G and especially in 5G networks. These steep
n
ccosts make it challenging for all but the largest mobile providers to build out
their networks for use with new generations of mobile protocols that require
many more cell sites because of their use of high-frequency, gigahertz spec-
trum bands and the increases in the amount of data and video traffic.
In addition to the high costs of operating cell sites, mobile providers manage huge
wired networks made up principally of fiber-optical cabling and some microwave
links. These links connect RAN traffic to:
• Backhaul between the evolved packet core, which is a mobile carrier’s data
center, and cell sites
• Other cells in the mobile network
• Other mobile networks
• The Internet
• Enterprise broadband networks
Characteristics of HetNets
HetNets are made up of large numbers of small cells controlled by larger macro cells to
which they are connected wirelessly or by fiber-optic cabling. HetNets’ low-powered
cells have smaller antennas, and fewer macro cell sites with towers. The architecture
includes larger macro cells that each control small cells as required by locations of
dense traffic. See Figures 7-9 and 7-10 for examples of HetNets architecture.
A low-power antenna at the cell edges result in less
interference with signals in adjacent cells.
Low-power antenna
Remote node low- Macro (donor with controller
power antenna for enodeB) antenna
better coverage at the with controller
edge
5G 5G equipment
cabinet cabinet can be
shared by multiple
operators
5G Base
cabinet station 5G equipment
Light pole cabinet
Base stations
• Base station takes signals on and off the wireless network.
• Macro station is connected to backhaul by fiber. Each base station
is connected by fiber over Common Public Radio Interface (CPRI)
to macro station
• Remote Radio Heads (RRHs) are small antennas and base stations located
on outdoor furniture such as thin light poles, telephone poles, and the side of
buildings.
• Micro Evolved eNodeBs (eNBs) are smaller eNBs controlled by macro
eNBs
• Home eNodeBs (HeNBs) are small cells used for coverage indoors in a
closed service group within, for example, office buildings. HeNBs are also
termed Femtocells.
• RNs (Relay Nodes) cells are Pico cells that serve smaller groups than
femtocells. These are also in a closed service group within buildings.
This decreases interference and improves voice quality and data speeds for mobile
users in the vicinity—both those served by the femtocells as well as those in the sur-
rounding macro network.
r
ribe
esubsc cribe
r
nk to th e subs
Downli to th
nlink
Dow
ider
prov
the ider
plink
to
e prov
U
nk to th
Upli
Two separate bands of spectrum A single-stream spectrum for the uplink and downlink
frequency. An 8×8 antenna has eight antennas and handsets communicating with it
also have eight antennas. This is analogous to multilane highways with eight lanes in
each direction.
MIMO antennas are available in 2×2, 4×4 and 8×8 send/receive channels. The
8×8 antenna is specified for LTE Advanced, the 100Mbps, true-4G air interface. As
antennas become more powerful, with additional antennas, it is technically challeng-
ing to equip handsets with multiple antennas because space is required between them
to avoid signal interference. See Massive MIMO below for information on antennas
suitable for 5th generation (5G) networks’ high-frequency bands.
● Multiple streams of data at slightly different frequencies arrive at their destination at different times
● Receiver decodes signal A and then signal B
In addition, guard bands between each stream of data are not required, which is
an important factor underpinning the spectral efficiency of OFDM. Guard bands are
unused channels of spectrum that provide a buffer between streams to protect data
from interference. Guard bands carry no data. This narrowband, efficient use of spec-
trum is the main reason why LTE supports many more users in each cell site than the
3G technologies.
358 7 Mobile and Wi-Fi Networks
T
Throughout this book, the term “carrier” has been used almost exclusively
in relation to network service providers. However, as it applies to telecom-
munications, the term actually has two meanings. Thus, in addition to
m
describing a network service provider, it can also refer to slices of spectrum
as it does in Orthogonal Frequency-Division air interfaces.
of transmitting gigabit data rates. These high data rates are made possible by aggregat-
ing carriers (channels) together. AT&T and others are now testing applications on 5G
NR. One future use is for controlling applications within cities to manage operations,
including traffic congestion. Other applications envisioned on 5G are self-driving cars
and trucks, the Internet of Things, and monitoring healthcare patients wearing wire-
lessly connected devices including blood pressure monitors.
Without 5G chips in mobile devices, they aren’t able to achieve gigabit data rates or
any other features available in 5G networks.
This is the reason that cellular providers continue to support older mobile proto-
cols when new ones become available. It can take 5 years for the majority of subscrib-
ers to upgrade to new generations of cellular service.
Most IOT devices have embedded batteries on chips that operate over LTE–NB
(narrowband) standard. Early implementations of IoT used LTE–M1 or M2, which
required a gateway to translate between the network and the devices. The fact that
LTE–NB does not require a gateway makes it less costly to manage and implement
because there is one less piece of equipment to install and monitor.
Embedded software in IoT devices can be updated and monitored by centralized
servers. Remotely monitored devices include automobiles, drones, parking meters, gas
and electric meters, municipal traffic signals, water towers, and soil conditions and
farms. A list of IOT applications are included in Table 7-3.
Battery Life
Inadequate battery life is a major issue with smartphone and tablet computer owners,
self-driving car and truck developers, and myriad other services that depend on battery
life. Battery technology has not kept up with users’ dependence on mobile services and
development of new, automated technologies. People are more dependent on portable
devices for their voice and text communications as well as social networking, music,
and increasingly, for video. They also use these devices on Wi-Fi networks and for
video conferences.
Data applications require more power from the device. Bandwidth-heavy applica-
tions such as Internet access, video, and e-mail drain batteries more quickly than voice
calls. This is because voice requires fewer bits than data when transmitted. In addition,
large color displays drain batteries more quickly than the less-sophisticated screens on
earlier devices. Thus, as people become increasingly dependent on mobile devices for
more functions, it is important to find ways to extend battery life.
A current focus is on ways to design mobile handsets that use power more effi-
ciently. One such technology extinguishes screen backlighting when it is not required.
The technology senses ambient lighting to determine when backlighting is needed. It
maintains color by creating brighter color pixels so that mobile devices don’t draw
current from backlights in daylight.
Another way that manufacturers design handsets to improve power management
is by including automatic sensing circuitry that shuts down memory, processors, and
peripherals when a handset is not transmitting. For example, if the user is not in a
Wi-Fi zone, the Wi-Fi circuitry is disabled so that it does not draw power when it can’t
even be used. Most smartphones and tablet computers include this form of power man-
agement. Other manufacturers are developing new screen technologies that consume
less power.
“pressure” of the electricity flowing through the handset’s circuits. Low “pressure” or
voltage means that less electricity is reaching the battery.
People that need more battery power than that built into the phone purchase bat-
tery packs that clip onto their mobile devices or mobile phone cases already equipped
with battery packs.
Mobile Payments
Mobile handsets can be utilized for mobile banking, financial transactions, contactless
payments at retail outlets, and instead of cash at subways and toll roads. These mobile
payment options include the following:
• Payments for mass transit Users can pass their smartphone near a reader
to pay for subway, bus, and train transportation instead of using tokens or
purchasing monthly passes. Apps on mobile phones can take advantage of a
short-range wireless technology called Near Field Communications (NFC)
to interact with the reader. The user simply needs to pass her phone within
1.56 inches (4 cm) of the payment reader.
• Check deposits Smartphone apps use the device’s camera to take a picture
of the check and then transmit the image to the user’s bank for deposit.
• Money transfers directly to a mobile phone in a developing country
When a relative or friend sends money to a person in a developing coun-
try via Western Union, the electronic cash is sent directly to the receiver’s
handset. MoreMagic, a Massachusetts software developer, created this
application.
• Online payments People surfing the Internet on their smartphone can
make online purchases through PayPal rather than having to type in their
credit card number along with their name, postal address, and e-mail
address.
All of these transactions require some type of software platform that sits between
credit card processing companies or banks and the mobile network. The platform must
have integrated security protocols and the ability to communicate with the financial
institutions that process payments. They also need to communicate with servers at
merchants’ sites and devices that act as “readers” of the mobile device making the
transaction.
Applications and Services 367
Each mobile handset and reader requires chips with NFC capability or special
software. The cost of these readers is often a stumbling block for retailers because they
need to place one at every cash register. Alternatively, readers can be embedded in por-
table devices that sales associates use to process credit card sales. Another challenge
for retailers is that there is no agreed-upon standard software platform. Thus, different
chips and software are required for Apple OS and Android operating systems because
different carriers and mobile operating systems adopt different software.
Machine-to-Machine Communications
between Devices with Embedded Radios
Machine-to-machine (M2M) mobile services refer to services that automatically mon-
itor the status of other systems or send software updates to devices. An example of an
M2M service is a central system that monitors vending machines remotely to deter-
mine inventory levels and diagnose possible problems. Another example of M2M traf-
fic is automatic monitoring of residential electric meters.
Both of these applications require software platforms and radios at customer data
centers as well as software and radios in the device to be updated or managed. Soft-
ware is required in the vending machines and meters that are able to connect to a
mobile network. However, these upgrades might require large investments. This is
true when new software is added to a utility’s meters. There is a potential to save on
operational costs by eliminating the need for technicians to manually read the meters.
It also has the potential to enable utilities to use energy more efficiently by monitoring
the grid and adjusting power distribution accordingly.
These transmissions are carried over a mobile carrier’s second-generation net-
work. Many of the current applications do not transmit enormous amounts of data.
M2M applications represent a revenue opportunity for mobile carriers. One reason is
that there are many more machines than there are end users, and many machines now
include software that can be upgraded for over-the-air diagnosis and updates.
Automobiles are examples of systems that contain more and more software,
including in-car entertainment systems that require automatic over-the-air updates.
Many new cars include options for touch screens on dashboards to activate various
networked functions and entertainment systems. These include in-car Wi-Fi hotspots
for passengers, outside sensors, rear-view cameras to assist in parking, and embedded
GPSs.
Another advantage to carriers of M2M service is the ease of support. Currently,
carriers operate large customer service centers for responding to questions about bill-
ing and technical issues. Customer service for M2M service is lower than that for
handsets because inquiries and customer service requests are only required for the
centralized staff members who manage these applications for customers.
368 7 Mobile and Wi-Fi Networks
built. Wi-Fi, short for wireless fidelity, is widely accepted worldwide with small varia-
tions. Table 7-4 lists the earliest commonly installed 802.11 network protocols.
In order for user smartphones and other devices to access any Wi-Fi
standard, the user device must contain a computer chip that matches the
s
802.11 standard, e.g. 802.11a, 802.11n and 802.11ac as well as other
8
newer Wi-Fi standards.
370 7 Mobile and Wi-Fi Networks
• Network congestion
• The distance from antennas
• Overhead, which is the number of bits required in packet headers for infor-
mation such as addressing and error correction
• Interference from thick walls or other material and glare from windows are
factors that can also decrease range
Wi-Fi routers with more antennas support more capacity and higher data rates.
To achieve the highest speeds and capacity, user devices as well as access points must
have an equal number of antennas. See Figure 7-13 for an example of a Wi-Fi access
point.
• Laptops
• Desktop Computers
• Connected environmental controls
• Networked light switches
• Cellular modems
Wi-Fi Standards, Architecture, and Their Use in Cellular Networks 373
• Smartphones
• Tablet computers
• Televisions
• Set-top boxes connected to HDTVs for streaming TV and movies from the
Internet, via, for example, Roku, Comcast’s Xbox, and Apple TV set-top boxes
• Printers
• Low-power medical devices used to monitor conditions remotely; for
example, blood pressure and glucose monitors
Wi-Fi access points are connected to switches in each floor’s wiring closets. See
Figure 7-14 for an example of a connection between access points and the wired local
area network. The point is, Wi-Fi is a way to connect internal wireless transmissions
to enterprise LANs, which then transmit Wi-Fi–originated traffic to the Internet or to
staff within the building or campus. A Wi-Fi controller or router is plugged into a port
on Ethernet switches at enterprises.
Controller can be on-site, in the Wiring closet switch
cloud, or at a provider’s data center
Floor 3
Floor 2
Wi-Fi in Homes
In a similar manner to enterprises, Wi-Fi access points connect to LANs within homes.
However, LANs within homes are less complex and the access points are generally
less robust, with fewer features and for the most part less complex security. In homes,
Wi-Fi–equipped gear such as printers, laptops, and smartphones have internal Wi-Fi
computer chips. The Wi-Fi router is directly cabled to cable modems or equipment
associated with the fiber-optic cabling in the outside network.
a point-to-point connection for the duration of the data session. It eliminates conges-
tion at a central point while at the same time avoiding a single point of failure. If an
access point fails, data is routed around the failure to another access point. The ability
to route traffic around failures and coverage gaps and interference from thick walls or
walls that contain wire, and large homes with three stories make them suitable for these
environments and also for outdoor areas.
Moreover, access points in mesh networks filter out traffic from untrusted sources
such as rogue access points. A rogue access point is an unauthorized access point
installed by an employee. Figure 7-15 presents an overview of a Wi-Fi mesh network.
In homes, people use a software app on their smartphone that is provided by their
Wi-Fi vendor to set up the mesh network. The user selects a centralized location for the
first access point and plugs it into power. The app then uses its intelligence to recom-
mend locations for the other access points.
There is currently no mesh networking standard for all of the functions required
in mesh networks. Thus, the entire network must now be provided by a single vendor.
The current standard only specifies how the link layer puts the data on and takes it off
the Wi-Fi network. A new certification program called Wi-Fi Certified Home Design is
still evolving that may enable access points from diverse manufacturers to interoper-
ate together. This will enable people and institutions to use equipment from different
vendors to interoperate with each other.
If an Access Point Fails, Traffic is Routed Around the
Failure to Another Access Point
• In band steering the network is able to route the same traffic between
2.4GHz and 5GHz depending on band availability.
• Client steering connects clients (user devices) to the access point that has the
strongest signal strength and the least congestion.
• Time synch is a Wi-Fi capability used in mesh networks to distribute and syn-
chronize traffic. It enables clients to connect to multiple access points at the
same time and an application in a server. Over-the-top streaming where speak-
ers and audio are synchronized down to a microsecond so that characters’
speech is coordinated with the way actors speak is an example of time synch.
wiring closets on each floor or locally by nearby electrical outlets. For local power,
new outlets might be needed.
Wi-Fi Controllers
Non-mesh Wi-Fi in small and medium-sized organizations have controllers that man-
age access points and monitor the network. Non-mesh Wi-Fi networks require that traf-
fic be routed through centralized controllers. The controllers are part of core switches
or separate devices. If they are part of separate devices, they sit between the wireless
and wired parts of networks. They are programmed with specifications of the level of
access different staff are allowed. They act as gateways to the network, allowing access
only to certain users. They often allow access to particular applications on a per-user
basis. In addition, centralized controllers authenticate users and access points. Impor-
tantly, they can identify unauthorized rogue access points that staff may bring to work.
They also pinpoint areas of congestion and gather statistics on usage into reports.
The Wi-Fi Protected Access 2 (WPA2) security standard was established in 2004
and is currently used. In 2018, the Wi-Fi Alliance announced an updated security pro-
tocol, WPA3. The Wi-Fi Alliance is an organization supported by equipment vendors
worldwide. It defines Wi-Fi standards and certifies equipment that meets the standards.
The Wi-Fi Alliance specified the following WPA3 improvements:
Employees that don’t have the newest smartphones and laptops won’t be able to
take advantage of Wi-Fi Protected Access 3. WPA3 was available in equipment late
in 2018. User devices without WPA3 will be able to continue using WPA2. The same
is true of older controllers, routers, and access points. For WPA3 to operate, each of
these pieces of gear must have WPA3 computer chips. However, the Wi-Fi Alliance has
announced that they will continue to support and enhance security and other features
on WPA2.
Comcast customers that download the Comcast App to their smartphone, laptop, or
tablet computer.
Wi-Fi equipment is less costly than base stations in mobile networks and spec-
trum is free. While cellular service excels at covering large areas, Wi-Fi service does
extremely well at providing coverage inside buildings where it is relatively inexpen-
sive to add access points.
This trend has been made possible by the advent of handsets with chips that sup-
port both Wi-Fi and mobile air interfaces. These interfaces are now tightly integrated
and have the capability to automatically hand traffic off between cell sites and Wi-Fi
networks. They additionally support both voice and data. However, using voice on
Wi-Fi networks drains batteries more quickly than on mobile networks.
The downside of operating large numbers of small cell sites and hotspots is main-
tenance. Large carriers can have 50,000 of these sites to manage. Many mobile opera-
tors outsource management of their hotspots to other firms.
The Wi-Fi hotspot business is multilayered and includes aggregators, cellular pro-
viders, and companies that supply back-office services such as billing, roaming, and
secure access to corporate networks from hotspots. Hotspot operators are also referred
to as Wireless Internet Service Providers (WISPs).
The largest hotspot operator in the United States is AT&T Wi-Fi Services (for-
merly Wayport before AT&T purchased it in 2008). AT&T Wi-Fi Services is an aggre-
gator. Aggregators install hardware and Internet access for hotspot services and resell
it to other providers who provide billing, marketing, and customer service to end
users. AT&T offers Wi-Fi access directly to its own subscribers as well as on a whole-
sale basis to other providers. These providers in turn offer it to their own customers.
T-Mobile USA also owns an extensive number of hotspots. It offers the service at no
charge to its subscribers.
Satellite Networks
Satellite networks are composed of a hub, the satellites themselves, and receiving dish
antennas. Receiving antennas also are called ground stations. Receivers on antennas
convert Radio Frequency (RF) wireless signals to electrical signals. The transmitter on
the antenna converts electrical signals to RF signals. The point from which broadcasts
originate is the hub on the ground. The hub has a large dish, routing equipment, and
fiber links to the enterprise’s headquarters for commercial customers. All communi-
cations broadcast from the hub travel up to the satellite and then down to the ground
stations (the satellite dishes).
Satellites are used to broadcast television and radio signals and to transmit posi-
tioning information to aircraft and air traffic controllers. Satellites are particularly
suited to broadcast signals to large areas for applications such as weather monitoring,
mapping, and military surveillance.
Satellites—Geosynchronous and Low Earth Orbiting 381
T area satellites cover is directly related to how high in the sky they are
The
located. Consider a flashlight: Holding it higher enables it to illuminate a
lo
large area. If the flashlight is held low, closer to a tabletop, for example, the
la
beam and coverage area shrinks.
Satellite providers with these high-frequency satellites also market their services
to rural areas and developing countries that have limited or no cable TV service. Dish
Network and AT&T-owned DirecTV distribute television signals in rural areas where
cable TV is not available. These services are prone to disruptions in heavy fog.
APPENDIX ..............................................................
389
390 Glossary
Bluetooth broadcast
A set of standards for special software on A message from one person or device for-
low-cost, low-powered radio chips that warded to multiple destinations. Video and
enables devices to communicate with one e-mail services have broadcast features
another over a short-range wireless link. whereby the same message can be sent to
Bluetooth eliminates cable clutter between multiple recipients or locations.
computers and peripherals in offices and sup-
ports wireless headsets for mobile handsets. BTA (Basic Trading Area)
A relatively small area in which the FCC
BOC (Bell Operating Company) allocates spectrum. There are 491 basic trad-
One of the 22 local Bell telephone compa- ing areas in the United States.
nies owned by AT&T Corporation prior to
1984. Examples of Bell Operating Compa- CAP (Competitive Access Provider)
nies are Michigan Bell, Illinois Bell, and Pac Originally provided midsize and large orga-
Bell. Bell Operating Companies are now nizations with connections to long-distance
part of AT&T Inc., CenturyLink, and Veri- providers that bypassed local telephone
zon Communications. companies. CAPs are now often referred
to as Competitive Local Exchange Carriers
border elements (CLECs) or competitive providers.
Another name for media gateways. See also
media gateways. CCIS (Common Channel Interoffice
Signaling)
bps (bits per second) A signaling technique used in public net-
The number of bits sent or received in one works. Signals such as those for dial tone and
second. ringing are carried on a separate path from
the actual telephone call. CCIS allows for
BRI (Basic Rate Interface) telephone company database queries used in
The ISDN interface made up of two B chan- features such as caller ID, call forwarding,
nels at 64 kilobits each and a signaling chan- and network-based voicemail. CCIS chan-
nel with a speed of 16 kilobits. nels are also used for billing and diagnosing
public network services.
bridge
A device that connects local or remote net- CDMA (Code-Division Multiple
works together. Bridges are used to connect Access)
small numbers of networks. Bridges do not An air interface used to transmit digital cel-
have routing intelligence. Organizations that lular signals between handheld devices and
want to connect more than four or five net- cellular carriers’ networks. CDMA assigns
works use routers. a unique code to every voice and data
transmission by using a channel of a par-
broadband ticular carrier’s airwaves. CDMA is a spread-
A data transmission scheme in which mul- spectrum technology that is used by Verizon
tiple transmissions share a communications Wireless, Sprint, and South Korean carriers
path. Cable television uses broadband trans- such as SKT.
mission techniques.
Glossary 393
organization’s name, and the type of organi- digital-to-analog and analog-to-digital voice
zation (for example, .com for commercial and conversions, and packetizes voice and video
.edu for educational). Both .com and .edu are in real time for IP networks.
top-level domain names. The domain name
can also designate the country, such as .bo for DTE (Data Terminal Equipment)
Bolivia. A domain name is part of the TCP/IP Devices that communicate over telephone
addressing convention. lines. Examples include multiplexers, PBXs,
key systems, and personal computers.
DoS (Denial-of-Service) attack
An attack by which hackers bombard net- DVB (Digital Video Broadcasting)
works with thousands of packets intended A standard approved by the European Tele-
to disrupt the capability of the attacked net- communications Standards Institute (ETSI).
work to function. It has lower resolution than HDTV.
dial-up telephone line using a 28.8Kbps without using specialized plug-in languages.
modem. Compression is used on the voice, Apple uses it on its mobile devices in com-
video, and data. petition with the proprietary Adobe Flash.
ISP (Internet Service Provider) companies were allowed to sell local tele-
An organization that connects end users to phone services. LATAs cover metropoli-
the Internet via broadband, mobile networks, tan statistical areas based on population
and dial-up telephone lines. ISPs often own sizes. For example, Massachusetts has two
Internet backbone networks. ISPs supply LATAs and Wisconsin has four, but Wyo-
services such as voicemail, hosting, and ming, which has a small population, has one
domain name registration. LATA. LATAs are sometimes used for bill-
ing telephone calls in the United States.
IXCs (Interexchange Carriers)
The long-distance companies that sell toll- Layer 4
free 800, international, data networking, and One of the seven layers of the OSI model.
outgoing telephone service on an interstate Layer 4 is the Transport layer that routes and
basis. They now also sell local telecommu- prioritizes packets, based on the source of the
nications services. packet, the destination port number, the pro-
tocol type, and the application. For example,
Java Layer 4 devices can prioritize voice and video
A programming language created by Sun so that networks using IP for voice and data
Microsystems. Multiple types of comput- can handle voice without the delays and lost
ers can read Java programs. They increase packets associated with lower-level protocols.
the power of the Internet because programs
written in Java (called applets) can be down- LDAP (Lightweight Directory Access
loaded temporarily by client computers. Protocol)
They do not take up permanent space on the A directory protocol that describes a uniform
client hard drive. Interactive games can use way of organizing information in directo-
Java programs. ries. Examples of LDAP directories include
the address books in e-mail systems. LDAP
LAN (Local Area Network) enables companies to use one central direc-
Enables computer devices such as personal tory to update multiple corporate directories.
computers, printers, alarm systems, and They also facilitate single sign-on to access
scanners to communicate with one another. different applications on corporate intranets.
Moreover, LANs allow multiple devices to
share and have access to expensive periph- leased line
erals such as printers, firewalls, and cen- Analogous to two tin cans with a string
tralized databases. A LAN is located on an between two or more sites. Organizations
individual organization’s premises. that rent leased lines pay a fixed monthly fee
for the leased lines that are available exclu-
LATA (Local Access And Transport sively to the organization that leases them.
Area) Leased lines can be used to transmit voice,
Upon divestiture in 1984, LATAs were set data, or video. They are also called private
up as the areas in which Bell telephone or dedicated lines.
402 Glossary
MVNOs (Mobile Virtual Network a network is the PSTN over which residen-
Operators) tial and commercial telephones and modems
MVNOs such as Tracfone and cable TV communicate with one another.
operators resell cellular service on cellular
carriers’ networks. NFV (Network Function
Virtualization)
NAS (Network Attached Storage) Virtualizes the functions of devices such as
The use of servers for storing files that can switches, routers, load balancers, and fire-
be accessed directly by computers located walls and installs these functions as virtual
on the LAN. NAS is less costly than tradi- machines in servers. Is used as an adjunct to
tional SANs. software-defined networks (SDNs).
PAN (Personal Area Network) send a packet to another device or host to see
Operates over small areas within rooms and if the device sends back a response. The ping
buildings. Bluetooth and RFID are examples also tests round-trip delay, the time it takes
of PANs. to send a message to another device.
are analog from the end user to the nearest PSTN (Public Switched Telephone
local telephone company equipment. People Network)
using POTS for data communications with The global network of circuit-switched tele-
modems are limited in the speed at which phone services that telephone companies
they can transmit data. operate. The PSTN comprises traditional
copper-based telephone lines, central office
presence switches, fiber-optic cabling, undersea cable
The ability of users to know when someone systems, cellular systems, microwave con-
within their community of users is available nections, communications satellites, and any
for real time or near real time messaging. other system connected via public telephone
switching centers. It does not include the
PRI (Primary Rate Interface) Internet or carriers’ private data networks.
A form of ISDN with 23 paths for voice,
video, and data and 1 channel for signals. push-to-talk
Each of the 24 channels transmits at 64Kbps. A walkie-talkie type of service pioneered by
Nextel (now part of Sprint) in which custom-
protocol ers reach one another by pushing a button
Defines how devices and networks com- on the side of their phone. They also dial an
municate with one another. For example, a abbreviated telephone number. Push-to-talk
suite of protocols known as TCP/IP spells is used to reach individuals or predefined
out rules for sending voice, images, and groups. Walkie-talkies are used on non-
data across the Internet and in corporate mobile spectrum between people that per-
networks. haps hike together or for parents to monitor
children in other rooms of a house.
proxy server
Authenticates callers to ensure that they are QoS (Quality of Service)
who they say they are before they are sent The ability to offer a number of priorities
to their destination. They serve as interme- for various types of communications includ-
diaries between callers and applications or ing voice, e-mail, and video on LANs and
endpoints, telephones, and other devices WANs.
connected to the LAN. For instance, a proxy
server in a VoIP environment ensures that radio
external devices requesting to communicate A wireless device with an antenna that con-
with an IP telephone are who they say they verts signals to and from formats compat-
are. ible with the airwaves. Wireless handsets are
radios.
PSAP (Public Safety Answering
Point) ransomware
Groups of agents that answer and dispatch A type of security attack where hack-
911 and E-911 calls for their town, county, ers encrypt organizations’ files, and then
or cluster of towns. They are often located at demand payment to decrypt the files to make
police stations. them readable again.
Glossary 407
SONET converts electronic impulses to light and audio is used in broadcasting video and
impulses, and vice versa. Telephone compa- audio over the Internet.
nies use SONET to transmit data from mul-
tiple customers over the same fiber cables. switching
Equipment with input and output ports that
spectrum transmits traffic and sets up paths to destina-
Made up of frequency bands or airwaves that tions based on digits dialed or addressing bits.
carry either analog or digital wireless sig-
nals. Spectrum consists of the multitude of T.120
invisible electric energy in frequency bands The ITU-defined standard for document
that surround the Earth and are used to trans- sharing and white boarding. People using
mit segregated radio waves. Radio waves T.120-adherent software can participate in
carry signals as electrical energy on unseen document-sharing conferences with one
waves. another over the Internet. For example, ven-
dors can demonstrate their products to poten-
SSAD (Solid State Drive) tial customers via computers connected to
Contains integrated circuits that store mem- the Internet at dispersed sites.
ory. SSDs are for the most part used as non-
volatile storage where data is not lost in T1
power outages. A North American and Japanese standard for
communicating at 1.54Mbps. A T1 line has
SSL (Secure Sockets Layer) the capacity for 24 voice or data channels.
A newer type of security for VPNs than
IPsec. It is embedded in browsers so that T3
organizations aren’t required to install spe- A North American standard for communicat-
cial client software in each user’s computer. ing at speeds of 44Mbps. T3 lines have 672
channels for voice and/or data. Fiber-optic
statistical multiplexing cabling or digital microwave is required for
Assumes that not all devices are active all T3 transmissions.
the time. A statistical multiplexer does not
save capacity for each device connected to it. tandem offices
It operates either on a first-come, first-served Used in the core of traditional, traditional
basis or on a priority basis in which certain Public Switched Telephone Networks
streams of traffic have higher priority than (PSTNs). Tandem central offices switch traf-
others. fic between central offices. End users are not
connected to tandem offices. Tandem central
streaming video and audio offices are being replaced by lower-cost,
A means of starting to play a message while more efficient softswitches.
the rest of it is being received. Streaming
uses compression to make the voice, video, TCP (Transmission Control Protocol)
and data files smaller so that they can be Includes sequence numbers for each packet
transmitted in less time. Streaming video so that the packets can be reassembled at
410 Glossary
their destination. The sequence numbers such as hosting and e-mail. Examples
ensure that all of the packets arrive and are include AT&T, Level 3, Sprint Nextel, and
assembled in the proper order. If some pack- Verizon.
ets are discarded because of congestion, the
network retransmits them. The numbering TDM (Time-Division Multiplexing)
and tracking of packets make TCP a connec- TDMs, such as T1/E1 equipment, save
tion-oriented protocol. Router-based LAN capacity for each device that is connected
internetworking uses TCP. to the multiplexer. This is less efficient than
other methods such as statistical multiplex-
TCP/IP (Transmission Control ing because capacity is unused when the
Protocol/Internet Protocol) device is not transmitting.
The suite of protocols used on the Internet
and also by organizations for communica- topology
tions among multiple networks. The geometric shape of the physical connec-
tion of the lines in a network—or, the “view
TD-SCDMA (Time-Division Synchro- from the top”—which is the shape of the
nous Code-Division Multiple Access) network, the configuration in which lines are
China Mobile uses TD-SCDMA, which is connected to one another.
a homegrown version of UMTS TDD (3G
mobile protocol), for its 3G mobile service. traffic shaping
A way for carriers to manage traffic to con-
tether trol congestion. Techniques include pro-
The ability to connect laptop or tablet com- viding better QoS for particular types of
puters that don’t have Internet access to traffic such as video, prioritizing traffic for
the Internet via a mobile handset’s Internet higher fees, and throttling traffic (decreasing
connection. This is generally done by con- speeds) for subscribers who exceed allotted
necting the computer and mobile handset amounts.
together through USB ports via USB-com-
patible cables. transponder
Fiber-optic transponders receive, amplify,
throughput and retransmit optical signals on different
The actual amount of user data that can be wavelength channels on fiber cabling. They
transmitted on a telecommunications link or also convert electrical signals to optical sig-
on wireless networks. Throughput does not nals and optical signals back to electrical
include headers, for example, bits used for signals where they connect to twisted-pair
addressing, error correction, or prioritizing copper or coaxial cabling.
packets with voice and data bits.
trunking gateway
tier 1 provider Converts packet network circuits (such as
A loosely defined term for Internet service T1/E1 and T3/E3), to those compatible with
providers that own Internet backbone fiber- the Public Switched Telephone Network
optic facilities in addition to ISP services (PSTN), and vice versa, so that voice traffic
Glossary 411
companies; 802.11 services are an example. twisted-pair copper cabling. The twists in
Most governments issue certification, signal- the copper cables cut down on the electri-
spreading, and power-limitation rules to pro- cal interference of signals carried on pairs
tect adjacent licensed spectrum bands from of wire near one another and near electrical
harmful interference from transmissions equipment.
within the unlicensed spectrum.
UWB (Ultra-Wideband)
Uplink (UL) A wireless service that supports higher data
On broadband and mobile networks, the rates than RFID and can be used for some of
uplink carries traffic from the customer to the same applications. However, widespread
the carrier’s equipment. adoption is held up by a lack of an agreed-
upon standard. It is also used by the military
URL (Universal Resource Locator) and by governments for tracking and for
An address on the World Wide Web. The finding people trapped under rubble.
address is made up of strings of data that
identify the server, the folder location, and VLANs (Virtual Local Area Networks)
other information indicating the location of Groups of devices programmed in Layer 2
information on the Internet. switches for special treatment in enterprise
networks. They are not grouped together in
USF (Universal Service Fund) physical networks; rather, they are grouped
Used to fulfill the commitment made by together in software for common treatment
the United States government to affordable and programming purposes. They are “vir-
universal telephone service to all residen- tual” networks that act as if they were sepa-
tial consumers. The Telecommunications rate LANs.
Act of 1996 expanded universal service to
rural healthcare organizations, libraries, and VoIP (Voice over Internet Protocol)
educational institutions for Internet access, The process of sending voice traffic in pack-
inside wiring, and computers. The library ets on IP-based data networks. VoIP digitizes
and educational subsidies are a part of uni- analog voice, compresses it, and puts it into
versal service known as the e-rate. Every packets at the sending end. The receiving
interstate carrier, cell phone, and paging end does the reverse. Unlike circuit switch-
company must pay a percentage of its inter- ing, no path is saved for the duration of the
state and international revenues to the fund. voice session. However, voice packets can
A separate fund, The Connect America be prioritized.
Fund, has been established for residential
broadband. VoLTE (Voice over LTE)
A 3rd Generation Partnership Program pro-
UTP (Unshielded Twisted-Pair) tocol used to carry packetized voice (VoIP)
Most inside telephones and computers are on LTE networks.
connected to one another via unshielded
Glossary 413
Numbers addresses
filtering, 243–244
3G networks, 334–335 IP (Internet Protocol), 96. See also MPLS
3GPP (3rd Generation Partnership Program), 335 (Multi-Protocol Label Switching)
3GPP2 (3rd Generation Partnership Project 2), 335 dynamic, 249
releases and revisions to, 384–385 IPv4, 275, 296–297
table of, 383–384 IPv6, 275, 296–297
4G networks, 333–335. See also LTE in Layer 3 switches, 71
(Long-Term Evolution) networks static, 249
5G networks, 335, 359–361 structure of, 294–297
utility pole attachments, 138–139 MAC (Media Access Control), 72
VR (virtual reality) and, 37 Adelphia, 134
10G-EPON (Gigabit Ethernet PON), 224 Admeld, 158
21st Century Fox, 126 Adsense, 277
40/100Gbps Ethernet switch standards, 74 ADSL (Asymmetric DSL), 267
128 Technology, 183–184 Adtran, 206
802.11 standards Advanced Audio Coding (AAC), 31
802.1pq, 118 Advanced Research Projects Agency
802.11ac, 372 (ARPANET), 23
802.11n, 370–371 agents, 153–154
capacity requirements, 372–373 aggregation routers, 292
table of, 368–369, 385–387 air interfaces, 355–358
911 call centers, 264–265 Akamai Technologies, 52,
193–195
A Alcoa, 83
Alert Logic, 55
AAC (Advanced Audio Coding), 31 alerts, 96–97
A-CAM (Alternative Connect America Model), Alexa, 116–117, 159, 160
141–142 algorithms
Access Control Lists (ACLs), 184 compression, 30–31, 32–33
access networks. See last-mile access networks search engines, 278–280
access points, 376 AlienVault, 133
ACLs (Access Control Lists), 184 Alltel Corporation, 151
Acme Packet, 183 Alphabet, 156. See also Google
415
416 Index
Alternative Connect America Model (A-CAM), 141–142 Asymmetric DSL (ADSL), 267
Altice USA, 135 asynchronous protocols, 191
Amazon, 5 AT&T
advertising, 159 breakup of, 128, 168
as agent, 153–154 cable TV services, 129–130
Alexa, 116–117 co-location facilities, 223
Amazon Web Services, 257 expenses, 126
brick-and-mortar stores, 308 FTTH (fiber to the home), 208–209
cloud computing, 44, 49–50, 53 ISP services, 276
data centers, 80 large enterprise reliance on, 130
expansion and diversification, 159 lobbying by, 148
expenses, 126 mergers and acquisitions, 126, 129–130, 132–133,
Fire TV, 283 151–152, 329
machine learning in, 22 rate of return guarantees, 139
network neutrality issues, 313–314 resellers, 155
services and offerings, 159 rural availability of, 315
subscriber numbers, 216 spectrum blocks, 327
subsidiaries and purchases, 159–160 subscription services, 216
video conferencing services, 109 Wi-Fi hotspots, 379–380
American Movil, 327–328 zero rating, 313
American Tower, 349 Atlantic Broadband, 153
amplifiers, 9–10 ATM PON (APON), 224
analog signaling, 63 attacks, 296–298
antennas distributed Denial of Service (DoS), 52
DAS (Distributed Antenna Systems), 354 DoS (Denial of Service), 52, 119
MIMO (Multiple-Input Multiple-Output), 356–357, insider breaches, 299–300
359, 370–371 ransomware, 304
any-to-any networks, 237. See also MPLS recognition of, 301
(Multi-Protocol Label Switching) redress against hackers, 304–305
AOL, 135 resistance to, 298–299
APDs (avalanche photodiodes), 17 response to, 301
APIs (application programming interfaces), security software, 299
47, 260 auctions, allocating spectrum with, 326–328
Apollo Global Management, 47 Audible.com, 160
APON (ATM PON), 224 augmented reality (AR), 37
Apple authentication
AAC (Advanced Audio Coding), 31 streaming media, 290
acquisitions by, 166–167 three-factor, 242–243
Apple Music, 5, 31 two-factor, 242–243
AppleTV, 283 automation, WA SDNs (Wide Area Software Defined
devices and offerings, 165–166 Networks), 261
appliances, 242 avalanche photodiodes (APDs), 17
application programming interfaces (APIs), 47, 260 Azure, 52, 53, 163, 257
applications, cloud computing and, 58–60
aQuantive, 165
AR (augmented reality), 37 B
ARM Holdings, Plc.21
backbone networks, 14, 104, 120
ARPANET (Advanced Research Projects Agency), 23
backhaul (middle-mile) networks, 152–153, 175,
asymmetric channels, transitioning to symmetric
197–199, 340–341
coaxial cable capacity, 214
backups
DOCSIS standards, 213–215, 225
cellular, 263
QAM (Quadrature Amplitude Modulation),
DSL (Digital Subscriber Line) technology, 263
214–215
Index 417
M mergers
competition and, 148–149
M2M (machine-to-machine) mobile services, 367 impact on consumers, 151
MAC (Media Access Control) addresses, 72 mobile operators, 149–152
machine learning, 5, 22–23 pre-2011 mergers, 132–133
macro cells, 351–352 mesh design, 192–193, 256, 374–376
magicJack, 233 messages, UC (Unified Communications), 107
managed services, 235. See also MPLS (Multi- Messenger, 161
Protocol Label Switching) metered pricing, 28
advantages of, 245 Metropolitan Area Networks. See MANs (Metropolitan
definition of, 245 Area Networks)
typical offerings, 246–247 Micro Evolved eNodeBs (eNBs), 352
MANO (Management and Organization), microchips, 21
179–181 Micron, 21
MANs (Metropolitan Area Networks), 196–197 Microsoft. See also Skype
dedicated services in, 253–254 acquisitions by, 163–165
definition of, 174 Azure, 52, 53, 257
manufacturers, IP telephony, 100–101 expenses, 126
Maps (Google), 277 middle-mile networks, 152–153, 175, 197–199,
Markley Group, 82, 223 340–341
Massive MIMO antennas, 359 middleware, 53
Mbps (millions of bits per second), 39 mileage, inter-exchange, 254
MCI Case, 168 MIMO (Multiple-Input Multiple-Output) antennas,
media. See also entertainment content, transmission of 356–357, 359, 370–371
consolidation issues, 144 mini Remote Access Multiplexers (mini-RAMs), 202
entertainment content, transmission of. See also minors, COPPA (Children’s Online Privacy Protection
streaming media Act), 146
headends, 195–196 MME (Mobility Management Entity), 344
hub sites, 196 mobile networks. See Wi-Fi and mobile networks
MANs (Metropolitan Area Networks), mobile operators. See individual companies
196–197 mobile payments, 366–367
gateways, 104–105 Mobile Virtual Network Operators (MVNOs),
streaming, 31–32 154–155
accessing, 282 Mobility Management Entity (MME), 344
ad revenue on, 286 modems, 210, 212, 341
competition, 215–216 Molla, Rani, 316
competition in, 286 Monero, 303
content available on, 284–285 monitoring
definition of, 280–281 cloud computing, 57–58
ease of use, 281, 287–289 LANs (local area networks)
growth in, 281 alerts, 96–97
industry impact, 127 changes, discovering, 96
Pay-TV, 289 charts and graphs, 98
set-top boxes for, 283 cloud solutions, 98–99
technical challenges, 289–290 LAN-connected devices, 93–94
worldwide availability, 287 purpose of, 94–95
types of, 75–76 system setup, 95–96
megahertz, 324 MotionBox, 289
memory Motorola Mobility, 278
caching, 293 moving applications between providers, 59–60
flash memory, 86–87 MPEG (Moving Picture Experts Group) standards,
spinning disks, 86–87 31, 64
Index 429
LEARN QUICKLY
Learn a new technology in just hours. Video training can teach more in
less time, and material is generally easier to absorb and remember.
TEST YOURSELF
CONVENIENT
Learn more, browse our store, and watch free, sample lessons at
i n f o r m i t. co m / v i d e o
Save 50%* off the list price of video courses with discount code VIDBOB
book/eBook + video bundles, individual video lessons, Rough Cuts, Safari Books Online, non-discountable titles, titles on promotion with our retail partners, and any title featured
Photo by izusek/gettyimages
*
Registration beneȴts vary by product. Beneȴts will be listed on your account page under
Registered Products.
Addison-Wesley • Adobe Press • Cisco Press • Microsoft Press • Pearson IT Certification • Prentice Hall • Que • Sams • Peachpit Press