UK Operators Opt for SyncE Backhaul

12 sept. 2011 | Publié par Anouar L |
Mobile Broadband Network Ltd. (MBNL), the networks joint venture between U.K. operators Everything Everywhere Ltd. and 3 , has signed an eight-year backhaul capacity deal with Virgin Media Business Ltd. worth more than £100 million (US$161.4 million), the two parties revealed today.

Virgin Media Business is building 14 regional aggregation networks across the U.K. using Synchronous Ethernet (SyncE)-enabled packet transport equipment to handle the data traffic generated by 35.2 million mobile users (of which 27.5 million are Everything Everywhere customers). Virgin Media Business says the new networks will offer MBNL backhaul aggregation links of 1 Gbit/s.

Virgin Media Business is clearly keen to stress the perceived benefits of deploying "ground breaking" SyncE infrastructure, noting that this will be the U.K.'s first such backhaul network.
According to one backhaul sector expert, SyncE is certainly an appropriate choice for next-generation backhaul networks, though Virgin Media Business may need to think about additional enhancements in the coming years if it is to keep up with its main mobile backhaul wholesale capacity rival, BT Group plc.

"Synchronous Ethernet is one of the key standards for packet backhaul synchronization," notes Patrick Donegan, senior analyst at Heavy Reading . "Over time, Virgin Media will probably need to add IEEE 1588v2 for time/phase synchronization to remain competitive with BT as Long Term Evolution (LTE) is rolled out. But for the short and medium term, Synchronous Ethernet does what's required and does so according to the physical layer synchronization model that operators are most familiar with in mobile backhaul environments," adds Donegan.
The deal is good news for Swedish transport infrastructure vendor Transmode Systems AB , which has landed an eight-year deal worth an estimated 150 million Swedish kronor ($23.3 million) during the next 15 months.

Transmode, which announced its entry into the mobile backhaul infrastructure market in September 2009, is supplying its Ethernet Mobile Backhaul product that's built on its Native Packet Optical architecture.
The deal includes the provision of the vendor's Ethernet Muxponder family (EMXP) and Ethernet Demarcation Units as well as a new ROADM-based network.

"Working with Transmode we're looking to transform backhaul networks by delivering a unique service that deploys fibre-based Ethernet services to cell sites," noted Virgin Media Business managing director Mark Heraghty in a prepared statement. "We're best placed to deliver the speed and capacity that mobile companies need. With a fibre-based core network, we’ve got big ambitions for this market and see it as integral to the growth of our overall market share. Our partnership with Transmode makes our proposition all the more compelling."
Transmode's share price remained unchanged at SEK 43.50 in morning trading on the Stockholm exchange. The company joined the public markets earlier this year.
Lire la suite...

Qualcomm's CEO says sci-fi future already here!

29 août 2011 | Publié par Anouar L |
5

--Qualcomm's Paul Jacobs believes the future of tech – in all its sci-fi glory – is already here, presenting amazing opportunities as well as serious challenges.

Speaking to Om Malik on Qualcomm Live, Jacobs discussed the embedding of wireless into almost all objects, in a world where mobile phones became more of a remote control than a talk enabled device.

“People will be injecting sensors into their body,” he said, adding, “it may sound like sci-fi, but it's not that far-fetched.”


Jacobs said the world of mobile was following a “natural progression,” and evolving as it moved forward. “We're on a path now and people get it,” he explained.

Speaking of some of the advances in telemedicine, Jacobs admitted that while physicians in the Western World tended to adopt new technology at a slow pace, the same was not true of the developing world, nor of the over-the-top (OTT) fitness and wellness industries, which were pushing ahead with new sensor technologies.

“The emerging market is a huge trend for wireless,” said Jacobs, giving the example of teledermatology, whereby smartphones could be used to snap photos of skin diseases on people in remote locations and sent off to experts for immediate analysis.

Qualcomm's engineers are also working on a model of the human brain, Jacobs revealed noting the firm's engineers were busy developing “really cool and interesting stuff that's way out there.”

In terms of current core businesses, Jacobs discussed the growing level of integration in chipsets to reduce costs, saying the firm was using a more “trickle up” effect rather than the standard trickle-down from higher end products. Qualcomm, he said, was also working hard to push out reference designs to partners, which he claimed cut down on development time and cost for OEMs wanting to push out products quickly and cheaply in the emerging markets.

The Qualcomm chief also spoke briefly about the Atheros acquisition, saying it had been key in the firm's strategy to come out with “different radios targeted at different kinds of applications.” Jacobs also said Qualcomm as a company tended to make smaller acquisitions and would continue to do so.

“We're not just a CDMA company, we're a wireless technology company,” he said outlining Qualcomm's plans for pushing the envelope by expanding network capacity, building “super cheap” base stations and continuing to develop augmented reality into “real 3D.”

Microsoft Windows 8, due to launch in just over two weeks, would also herald a “huge amount of creativity” said Jacobs, mulling the possibilities of new thinner, lighter computing designs running on ARM chips.

For all the good technology brings, however, Jacobs admitted he did also have fears for the risks the world now faced because of it.

“I worry about cyber security,” he told Malik, outlying his concern for a ‘Blade Runner' type situation should the country's infrastructure ever get hacked.

One thing Jacobs isn't overly concerned about, however, is an ongoing bout of patent wars. “the patent stuff will settle itself out,” he posited, noting that for its part, Qualcomm preferred to “create more peace” through cross licensing.
Lire la suite...

Who Wants WebOS?

28 août 2011 | Publié par Anouar L |

It's all about software this week as Google acquires a hardware business and Hewlett-Packard Co. gets rid of one.

  • Who wants webOS?: HP doesn't want to build the hardware for webOS, but it may have to convince someone else to, since it can't license a platform it's giving up on. The companies that are emerging as potential suitors for the operating system have included the obvious handset makers without an OS to call their own, High Tech Computer Corp. (HTC) , LG-Ericsson Co. Ltd. or Samsung Corp. , and then some non-hardware players like Facebook or Amazon.com Inc.

  • What's next for HTC: Speaking of HTC, the company sent out press invites teasing a pre-IFA press event to "see what's next." Samsung has a competing event set for the same date, Sept. 1. Both will likely show off their forthcoming Android-based handset lineups, but -- given the news storm of late -- there could be a surprise or two in the mix.

  • Samsung seeks software: HTC and Samsung are smart to be thinking about what's next now that Google is set to own Motorola Mobility Inc. Most seem torn over whether the deal is good for Android's handset partners because of the patent protection or bad because it potentially makes Google their hardware competitor. Either way, Samsung isn't sitting idly by. The South Korean company is reportedly stepping up its software game, looking to acquire companies and talent to make sure it stays competitive at both the hardware and the OS level. 

  • Apple weasels in: Apple Inc.  never likes to sit out a busy news week, letting others hog the limelight. This week was no different as rumors popped up that the iPhone maker is testing Long Term Evolution (LTE) devices with its carrier partners. The latest in the iPhone 5 saga also has an AT&T Inc.  VP telling employees to gear up for a "really, really busy next 35-50 days." With August slipping away, most now believe the iPhone 5 will be announced at the end of September and shipped in early October. 

  • Happy new iPad 3!: Luckily Apple never has to be the one making the news splash, because rumor-mongers always do it for the Cupertino giant. According to The Wall Street Journal's sources, Apple is working with components suppliers for the next version of its iPad, set to launch early next year. iPad 3 is expected to have a larger, high-res touchscreen, and the company has reportedly placed parts orders for about 1.5 million iPad 3s in the fourth quarter.

  • Lire la suite...

    "Good Enough" Network Versus The Next-Generation Network Demonstration

    14 août 2011 | Publié par Anouar L |

    Lire la suite...

    Facebook Investor Roger McNamee Explains Why Social Is Over

    30 juil. 2011 | Publié par Anouar L |
    Elevation Partners co-founder and Facebook investor Roger McNamee, who is also a rock musician, gave an amazing talk recently where he goes over some of the biggest trends affecting the technology industry.


    McNamee's bottomline? Everything is changing. More specifically, a few big themes:
    • Microsoft is toast because we're moving to a post-PC era;
    • HTML5, the new web standard that allows to make interactive web pages, is going to revolutionize the media and advertising industries;
    • Social is "done", it's now a feature, don't go do a social startup.

    Here's what we thought were the most interesting points and assertions from the speech (quotes are paraphrased):
    • Microsoft's share of internet-connected devices has gone from 95% to under 50% in 3 years;

    • Windows no longer provides measurable ROI to enterprises, who will shift spending to other products and services; this is a huge opportunity;

    • Google is a victim of its own success: its search has become polluted by SEOs. What shows that Google has failed is all those "non-search" services that really solve a search problem, like Match.com or Realtor.com. If you add them all up, they account for 50% of searches.

    • HTML5 is going to change everything. "In HTML5, an ad is an app, a tweet is an app, everything is an app." "It's a blank sheet of paper, and creativity rules again."

    • For example, "my band is putting out a full HTML5 site. You can watch all of our shows on an iPhone, live." It's very cheap and it changes the game because they don't have to pay anyone anything.

    • In HTML5, you don't need to have display ads: Amazon can have a section of its store as an ad. So if you're reading a book review, you can buy the book right from the page.

    • Because HTML5 can make sites rich and interactive, engagement on a site can go from seconds to minutes.

    • So a site could say: we have 5 sponsors today, which one would you like, and the sponsor follows you around throughout your experience on the site. "The fact that you can create and satisfy demand in the same place is only true in infomercials today, but it will be true on the web." This, in turn, is highly disruptive to TV advertising.

    • "The iPad is the most important device since the IBM PC."

    • "Apple will sell a hundred million internet-connected devices this year. That's two thirds of the PC market." If you add the other non-PC internet devices, that's more valuable than the PC market.

    • The iPad is the training wheels for HTML5. iPad apps show us what we need to beat in terms of creating a better experience on HTML5.

    • Apple is an unstoppable freight train. In terms of tablets, it has no competitors and will probably end up with iPod-like marketshare. "It's like IBM in the 60s; I can't predict what that means; you need to find a way to play with it, but you also need to find a way to play over it" with HTML5.

    • The fact that most people now have more than one device means the cloud is vital, because you want to have all your stuff on all your devices. It also means the old PC paradigm is dead, because the old PC paradigm means everything stored on one device, instead of everything in the cloud synced to many devices.

    • In terms of keeping your stuff in the cloud, "Google, Microsoft, Facebook and Apple have completely failed to get the mobile experience right." (We'll let McNamee stand by that statement.)

    • "Facebook has decided that they're Twitter on steroids".

    • Currently Facebook Connect is free; eventually they'll charge for it because it's access to their social graph which publishers need, and that's how they'l make money.

    • Don't try to be "social": the big social platforms are created. You can't create a social company, it's just a checkbox. "The last 500 social companies funded by the VC community are all worthless. I'm serious."

    • But this creates an opportunity: while everyone is focused on social distribution, there's a huge opportunity to get content right with HTML5. "Let's create a new product, the way music videos were a new product."

    • Apple makes more gross margin per iPhone than most Android phones make in gross revenue, McNamee says.

    • "Television is the last protected media business," but it's going to get disrupted. For one, once televisions are computers, analytics of who watches will get more accurate than Nielsen panels. "Everyone knows that if we go to actual measurement, ad rates will collapse because the numbers aren't as good as Nielsen makes them look."

    • McNamee also had a few words about the economy: "we're about 40% of the way of deleveraging the global economy, but we're only 10% of the way of deleveraging the US consumer...I don't care what your politics are, removing government demand from the economy when it's struggling is ridiculous." And to prop things up, the Fed is printing money and inflating bubbles, "but for us, that's great!": capital is very cheap; consumers are acting like the party's on, so there's lots of opporutnities.

    • McNamee says he does "full contact investing": he proves the concepts of what he invests in by trying them out with his band. So he knows HTML5 is going to work because it works for his band. Then he added, to audience laughter: "You're going to say it's a dipshit little band, yeah, it is, but we like it and our fans like it" and it works.


    Lire la suite...

    The open internet

    | Publié par Anouar L |

    We live in the age of electronics, where many aspects of daily life are shaped - for good or ill - by the capabilities of machines that rely on the flow and detection of tiny electric currents and the opening and closing of silicon-based switches.
    These days most of the switches and circuits are in computers, though we should not forget that radio, the medium that many of you will be using to listen to me now, was the first mass-market electronic technology.
    The things these technologies can do are truly astonishing, and their application has transformed the lives of us all - not just those like me who have easy access to the latest shiny toys, but even those who live in poverty and may never themselves hold a mobile phone or computer or share information over the Internet.
    But no technology exists in a vacuum, and the growing use of powerful digital computers connected by an ever-faster and ever more pervasive networks requires us to ask hard questions about the ways they will be used to shape society.
    The idea of 'openness' lies at the centre of this debate.
    Defining open
    If we want an open society based around principles of equality of opportunity, social justice and free expression, we need to build it on technologies which are themselves 'open', and that this is the only way to encourage a diverse online culture that allows all voices to be heard. But even if you agree with me, deciding what we mean by 'open' is far from straightforward:
    Does it mean an internet built around the end-to-end principle, where any connected computer can exchange data with any other computer and the network itself is unaware of the 'meaning' of the bits exchanged? 
    Does it mean computers that will run any program written for them, rather than requiring them to be vetted and approved by gateway companies?
    Does it mean free software that can be used, changed and redistributed by anyone without payment or permission?
    Those things count as 'open', but you might have a very different view.You might not even think that it is a good thing: openness brings its own risks, as we've seen throughout this series of programmes.
    Changing reality
    Digital information is very hard to control in an open world, because it arrives in a form that allows it to be manipulated by its recipient.
    When you listen to the radio or record a TV programme on tape all you can easily do with the result is listen or watch again. You may be able to select which bits you watch, but transforming the stored form is complex and often impossible.
    If you are listening to the podcast of this programme, however, then you have a digital file on your computer that you could load into an editing programme like the freely available Audacity, and then you can slow down… cut words up or even add another person's voice  - seamlessly.
    Those whose businesses rely on limiting people's ability to copy and modify songs or images or video - the 'content industries' - find it hard to cope with the openness I've described, but so do those who want to manage the free flow of information for reasons that are not simply commercial, such as the doctors who keep my medical records or the companies storing my personal e-mails.
    In some respects today's Internet is a vast, unregulated, worldwide experiment in openness, and it is already having significant consequences.
    It is one that started because of the largely unanticipated consequences of the global adoption of a set of technologies that were built around an assumption of openness without any real concern for the broader impact.
    We cannot simply pull down the walls to the unimpeded flow of information and expect no consequences, so while I continue to think that the real benefits of the network will only be seen if we make it as open as possible, I know that openness carries a price. And of course we could decide to do things differently.
    Over a decade ago Lawrence Lessig pointed out, in 'Code and other Laws of Cyberspace' that CODE IS LAW.That means we can change the rules of the internet as easily as we change the code.

    Just because we currently have a mostly open network is no reason to believe that there is a pre-ordained path towards constant improvement as we deploy advanced digital technologies throughout the world.Different choices could be made at every stage, and the outcome is far from determinated.
    It could be a regulated, managed and limited network of the sort being constructed in some countries. Access to dissenting or distinct voices could be limited and managed.We could choose the apparent safety of a closed network and a closed society.
    Lire la suite...

    What'll Be Inside iPhone 5?

    9 juil. 2011 | Publié par Anouar L |
    It was Apple Inc.'s components suppliers that were responsible for leaking confirmation of a September debut for the thinner, lighter iPhone 5 (or 4S). But what will those components be, and which companies will make their way into the guts of the handset?



    Investigators believe, among other things, the next version will feature a Qualcomm Inc. baseband chip for CDMA and GSM connectivity, a Broadcom Corp.  component and a much simpler system integration design. And, sources tell The Wall Street Journal that Apple has already ordered these key components for its new iPhone.

    Here's a look at what else TechInsights expects was on Apple's order:

    Baseband Chipset: Most have given up hope of Long Term Evolution (LTE) support in the phone, but if Qualcomm is the chip supplier with its MDM6600, there's a good chance one model will at least be compatible with both AT&T Inc.  and Verizon Wireless HSPA+ and 3G CDMA network, respectively. Most expect both carriers to get the device at the same time this year. 
    Qualcomm's win in the phone is not a given, however. Steve Bitton, TechInsight's senior technology analyst, points out that while a universal phone would make the most sense, Apple did opt for the old Infineon Technologies AG  chip in the GSM iPad 2. For this reason, it might make sense for Apple to move to a newer, forward-compatible HSPA+ chip made by Infineon.

    Processor: It's fairly certain that Apple's own dual-core processor, the A5, will power the iPhone 5, but it's less clear which company will manufacture it. Many have speculated that Apple will move to a smaller 28-nanometer (nm) manufacturing process from Taiwan Semiconductor Manufacturing Co. (TSMC). Bitton says, however, that it's more likely to stick with Samsung Corp. 's 45nm processor, which it used in the iPad 2.
    The two companies have been warring in the courtrooms over patent infringement allegations, but Bitton says TSMC's difficulty ramping up to 28nm may make Apple reconsider. 

    Connectivity: Alongside Qualcomm's chip will be the Broadcom BCM4330 for Wi-Fi, Bluetooth and FM connectivity, Bitton predicts.

    Accelerometer and Gyroscope: It's not all a new-parts party for the iPhone 5. TechInsights believes that Apple will stick with the same accelerometer and gyroscope combo from ST Microelectronics that it used in the fourth version of the handset.

    Camera: The camera image sensor will also come from an old supplier, OmniVision Technologies Inc., but the company will debut a new sensor for the phone just as they did on the iPhone 4. This time, it will be powering an 8-megapixel camera too. Bitton doesn't expect OmniVision competitor Sony Corp. to be a second source for Apple as some reports have suggested.

    Display: Apple has recently filed patents around OLED touch screens, which could suggest iPhone 5 will include a larger, sharper display, also improving visibility in sunlight and reduced power consumption.

    Production: The biggest question mark for TechInsights is around the system integration and mechanical design of the new phone. David Carey, VP of technical intelligence at the company, writes that the heritage of the iPhone’s design has been very pretty, but often quite complex, relying on low-cost human capital. Carey writes:
      Given rising labor costs in China (and some not-so-nice stories about Apple/Foxconn) and its impact on the overall bottom line, we speculate that the newest version of the iPhone should see a simpler system integration design to streamline production. It’s the logical next step in the iPhone’s evolution.
    Lire la suite...

    Educate employees about IT security

    15 mai 2011 | Publié par Anouar L | Libellés :


    A solid network foundation is the key to business agility, process efficiency, productivity, and competitiveness. This allows companies to establish competitive advantages, extend or improve their operations and run business applications to respond accurately to the customer expectations.
    Businesses can now affordably be spread across the globe and have inter-office collaboration on a daily basis. But all of that interconnectedness relies in large part on the ability to protect the networks that create those connections.

    It is almost impossible for all the firewalls, IPS, IDS and antivirus software you install on a business network to stop every security threat! The last years have seen hackers and web criminals become more and more effective at compromising the networks, as they have quickly developed newer and more malicious threats to network security. So in a way to increase the degree of efficiency for any security tool you need to rely on a security policy which means involving the employees to help keep your network safe.
    In fact, the employee is on the front line, deciding every day whether or not to open a mysterious email file attachment or downloading suspicious content. The employee should be made aware not only of network security importance but also of what he can do to prevent security attacks to the company and obviously also to himself.

    The most difficult part of the job is to ask employees to change their behavior! They may have to stop sticking down their passwords in plain sight, stop downloading untrusted contents from the Internet and start using passwords or stronger passwords on their devices: laptop, tablet, smartphone… The key solution is to incite the network users to follow your security policies by highlighting for them the benefit from tighter network security and showing them the good habits when using the company network, even if that means they can’t access their social network profiles from the company internet access.
    In the following, some ways you can adopt to teach the employees about network security:

    •   Make network security personal
    Network security may probably seem like an abstract concept to most employees, but may obviously have personal devices and may use them for online shopping; you can use that scenario to change their behavior either on the home network or on the company’s one.
    Explain to the employees the importance of protecting their information, including details about their identity, by following security policies to keep the business network locked down. 

    •   Be accessible to network users
    Employees need to know who to contact if they experience a network security incident or have questions about security. It’s also very important that users know what to do - or not to do – when facing security problems or while waiting for the IT security support.

    •   Engage the company in ongoing security training
    As we said before, hackers are constantly developing new clever methods to trick even the most cautious internautes into downloading their malware or respond to a hoax email to get an unauthorized access, misuse, modify or deny network-accessible resources.
    In way to help your users stay aware of the lasts threats tricks; you should give theme network security training from their beginning at the company, and the training should be ongoing. Network users need also regular reminders, whether it’s to change their network access password every month or tips on recognizing the latest phishing scheme. 

    •   Tell your networkers what to do
    During the security training sessions you should inform the users of how they should react to a security threat and how to prevent it as well as the immediate actions they should take with their computer before that the security expert comes for help. 

    •   Make security easy as possible
    Even the most well trained and caring networkers would be tempted to circumvent difficult security measures; so, try to ease the security so the employees follow the security policy.
    Proceedings like periodical prompting for passwords change or nightly automatic anti-virus software update should be adopted. Also, think of rewarding employees for their efforts on keeping your network safe.


    As we continue to become an ever more networked society, the financial benefits attainable by hacking a network increase. As a result, it should come as no surprise that the number of attacks and the creativity spent in trying to breach a network continue to increase.

    Consequently, the network administrator who is tasked with defending network must continue to educate himself and the company workforce on the newest types of attacks and make the necessary preparations to prevent against them.
    Lire la suite...

    Terabit Networks

    6 mai 2011 | Publié par Anouar L | Libellés :
    Terabit networks support transmission rates of at least one trillion(1012) bits/second (Tb/s)1. These networks are becoming more common because they provide the capacity and bandwidth needed to meet increasing customer demand for data and voice communications, and to support future Internet growth of high quality video and e-commerce applications. When properly designed they can also reduce latency for Long Haul Network (LHN) traffic, reduce the time needed for new circuit provisioning, and reduce overall network management complexity as well.

    This overview of terabit networks consists of the following subsections:
    • Market and Service Drivers
    • Challenges and Requirements
    • Service Network Architecture - Overview
    • Service Network Architecture - Detailed View
    • Core Optical Network (CON) Traffic Provisioning & Management
    • Terabit Optical Technologies
    • For Further Reading

    Market and Service Drivers
    Demand for terabit networks is being driven by a variety of factors. Residential users want more bandwidth for video, electronic gaming and music applications. Even though today’s networks can often provide up to 10 Mb/s bandwidth per household, tomorrow’s HDTV and multi-channel video applications will require ten times that rate.

    Moreover, Hollywood studios are now predicting that the "future of cinema" will require real-time streaming of Super High-Definition (SHD) video. For picture quality equivalent to film, the "SHD-4K" technology will require at least four times the bandwidth needed for HDTV - meaning at least 1 Gb/s per household! Once you can imagine a neighborhood of a thousand households, each demanding 1 Gb/s of bandwidth, it’s easy to see how terabit networks could become commonplace. Also, extrapolating this to an entire city gives an inkling of the transmission rates that will be needed for the next generation of IP networks.

    Small businesses will also require increased network access speeds to support the proliferation of interactive services for customers placing orders via IP-Phones, Video-Phones, etc. Similarly, telecommuters working from home will want VPN access to enterprise networks. As one of many examples, this would permit running complex equipment performance simulations on enterprise mainframe computers. Both of these terabit network users will likely demand Service Level Agreements (SLAs) that offer shorter out-of-service times, lower transfer delays, more well-defined QoS mechanisms, and enhanced traffic admission controls when compared with today’s networks.

     Large Corporate Enterprises have all of the above requirements and in addition they will require:

    •  Higher speeds
    • Support for more complex point-to-point or point-to-multipoint topologies
    •  Ability to handle mixed-traffic and protocols
    • Support for generalized Virtual Private Network (VPN) configurations
    • Resilient back-up support and automated contingency configurations to protect against failures.
    Challenges and Requirements

    The above market and service drivers give rise to some unique terabit network challenges and requirements. Chief among these as described in more detail below are: network scalability, flexibility, efficiency and transparency, improved network management & operations costs, multi-protocol support, rapid service recovery, and authentication, authorization and accounting.

    • Network Scalability
    Terabit network applications are characterized by unpredictable client traffic demands combined with stringent requirements on Quality-of-Service (QoS). Traditionally, traffic planners could consider capacity growth in three-, five- and ten-year increments. Today, the rapid and explosive growth in web video, mobile messaging, wi-fi and wi-max applications, means time frames as short as six months must also be considered. Thus, graceful scalability is a prime terabit network requirement.
    • Flexibility, Efficiency and Transparency
    From a customer service perspective, terabit network platforms must be very flexible, enabling clients to increase service velocity on demand at any time, and from any location. The networks must also efficiently accommodate a diverse set of both differentiated service offerings (e.g., based on priority, resiliency, etc.), and wide-ranging traffic characteristics (e.g. real-time traffic, legacy protocols, high peak traffic, etc.).
    • Improved Network Management & Operations Costs
    Today’s users not only want more bandwidth for their money, they demand simpler and low-cost network management & operations procedures. Hence terabit network equipment suppliers must offer both operational savings (lower power consumption, reduced management complexity, smaller footprint), and support modular deployments, and continuous growth.
    • Multi-Protocol Support
    As new services proliferate, terabit network operators are looking to new "de-layered" and transparent network infrastructures to support all customer services across all customer locations, while providing reduced transmission and operations overhead for a variety of protocols.
    • Rapid Service Recovery
    SONET/SDH network providers using Resilient Packet Ring (RPR) technology built to meet the IEEE 802.17 RPR standard are accustomed to a maximum dual-ring-topology restoration time of 50 mSec. Some network equipment venders offer even faster recovery times. New terabit network technologies must offer at least this level of protection or better.
    • Authentication, Authorization and Accounting
    Authentication, authorization and accounting are the known as the "triple-A" of network security. A key terabit network infrastructure issue is how to provide the servers and security mechanisms to ensure that no single person or resource can gain network access without proper authorization.
    Service Network Architecture - Overview
    Figure 1 shows a layered architecture model for terabit networks that is emerging for enterprise and public service provider infrastructures alike. The lowest layer supports multi-service access for all types of data, voice, and video over a single packet-cell-based infrastructure. The benefits of multi-service access are reduced OPerating EXpenses (OPEX)2, higher performance, greater flexibility, integration and control, and faster service deployment.

    The heart of the architecture is a Core Optical Network (CON) which serves to interconnect the multi-service access points with the service platform. Since per-bit profit margins will still be constrained by aggressive competition, the CON must be designed with minimal complexity to reduce costs, while still flexibly and efficiently supporting multi-service transport.

    Figure 1. Layered Terabit Network Service Architecture - Overview

    CON packet forwarding overhead is greatly reduced through use of Multi-Protocol Label Switching (MPLS) technology. Internet Protocol (IP) packets have a field in their header containing the address to which the packet is to be routed. Traditional routing networks process this information at every router in a packet's path through the network. Using MPLS, however, when the data packet enters the first router, the header analysis is done just once and a new label is attached to the packet. Subsequent CON MPLS routers can then forward the packet by inspecting only the new label.
    In MPLS terminology, the CON routers are classified into two categories: high-performance packet classifiers called Edge Routers or Label Edge Routers (LERs) that apply (and remove) the requisite MPLS labels, and core routers that perform routing based only on Label Switching and are also called Label Switch Routers (LSRs).

    MPLS technology supports both traffic prioritization and QoS, and it can be used to carry many different kinds of traffic, including IP packets, ATM, SONET, and Ethernet. IP will likely be the near-universal technology used to implement the service layer, and Dense Wavelength Division Multiplexing (DWDM) will be used to increase bandwidth over existing fiber-optic backbones.
    Finally, the CON will link to the service platform which will in turn support execution of a variety of distributed applications, network management processes and signaling and control functions, as well as access to a diversity of information content types.
    Service Network Architecture - Detailed View 

    Figure 2. Layered Terabit Network Service Architecture - Detailed View


     Figure 2 shows the layered architecture model for terabit networks in more detail. It consists of the following parts:

    Personal Area Networks (PANs)
    Areas one to three meters in extent which are serviced by wireless technologies such as Bluetooth, Zigbee and Wireless Universal Serial Bus (WUSB).

    Local Area Networks (LANs)
    Link user premises to the first network node. Next generation LANs will be optical and support 100 Gb/s; one terabit Ethernet is being planned for 2010-12.
    Metropolitan Area Networks (MANs)
    Provide corporate connections inside the city. Here fiber optics and Ethernet protocol is the favorite as a MAC layer, although SONET/SDH is also in use. Terabit network technology will initially have the most impact on MANs and Long Haul Networks (LHNs).
    Distribution and Transport Network (LHN)
    Is the inter-city equivalent to the "express train" that transports many people through long distances. But if you don’t live in a city you’ll need to access a "local light rail" line somewhere close to home. That’s the distribution network that could be "along the way" of the express route, or a complementary route "orthogonal" to the express line. Ideally, both networks will be planned together and use the same technology.

    Regional Area Networks (RANs)
    Are useful for localized services from a regional carrier, a local enterprise, or a county or group of cities. RANs are needed for services that exceed geographic boundaries such as those for international corporations, national services, federal police networks, etc.
    The main topological design problem in terabit networks is deciding where to locate multi-service access nodes, and how to provision and manage traffic flexibly and efficiently as described in more detail in the next section.


    Core Optical Network (CON) Traffic Provisioning & Management
    Provisioning and management of terabit network traffic must be done simply and efficiently to maximize network throughput, reduce buffer size and processing power, and to minimize delay due to memory allocation and packet processing at CON nodes. Multi-service access nodes and MAN transport will depend on Ethernet Layer 2 (L2) aggregation techniques whereby frame labels such as Virtual LAN (VLAN) tags or MPLS Permanent Virtual Circuits (PVCs) support a finer level of granularity than provided by the Long Haul Network (LHN).

    VLAN tags and PVCs connect customer IP routers to an IP service switch at the CON’s edge. Residences, small businesses and small-to-medium enterprises with links to multi-service access nodes will migrate to Passive Optical Networks (PONs) to-the-curb (or to-the-Building), and will be terminated using a variety of "last mile" technologies including copper, wireless3 and fiber.



    Link Capacity Adjustment Scheme (LCAS) with Virtual Concatenation (VC)
    The Optical Internetworking Forum (OIF) defines the Optical User-Network Interface (UNI) that provides an interface by which a client may request services from an optical network. The SONET/SDH Link Capacity Adjustment Scheme (LCAS) includes automated traffic provisioning by means of Virtual Concatenation (VC) in a variety of sizes and can automatically adjust the transmission capacity seen by the end user. Automated connection provisioning opens the way to offer additional services such as intelligent protection and restoration of back-up links without requiring expensive hardware components to achieve redundancy.

    Traffic Grooming
    Multiplexing frames at network ingress points compromises efficiency when the network has many entry points. Accommodating frames inside faster and longer frames requires a tradeoff between load flexibility and efficient use of link capacity. Newer optical grooming technologies support traffic flows that minimize the number of add/drop operations. Admission control enables client traffic to be controlled based on a mutually agreed-upon Service Level Agreement (SLA). Traffic management depends on queuing and scheduling procedures for the incoming traffic flows that were authorized by admission control. LCAS/VC offers network providers flexibility inside virtual circuits to accommodate client traffic fluctuations and add/drop of circuits without changing the network physical structure.

    Distributed and Automated Network Management

    Terabit networks require a large number of measurements and traffic data that must be processed by the NMSs to prevent traffic overloads. The huge volume of this data can result in long delays before the network traffic is brought under control. Moreover, a central node or link failure can readily erode the QoS on a large portion of any network. Traditional NMSs have centralized control. However, the terabit network’s increased complexity, equipment diversity, need for flexible service provisioning, topology reconfiguration and protocol updates, as well as traffic fluctuations, mandate a distributed and automated approach to network management.
    Current SONET/SDH networks use manual processes and Network Management Systems (NMSs) to implement optical connections from one location to another. Turn-around time to provision a new connection can take as long as six weeks, and the configuration process can take several hours, especially if more than one carrier is involved. While this may be acceptable for LHN where the end nodes are cities and change infrequently, it is by no means responsive enough for MAN solutions where end nodes are enterprise branches or connections between enterprises.
    Optical links to support MANs require a dynamic automated provisioning system that offers short turnaround times, flexible scalability, fine traffic granularities, and is amenable to frequent changes. Recently, dynamic provisioning protocols have emerged that let carriers establish connections not only within a single carrier’s territory, but can also provide dynamic provisioning across multiple carriers on an end-to-end basis.

    Terabit Optical Technologies
    Wavelength Division Multiplexing (WDM) has dominated fiber-optic transmission technology since the development of tunable lasers. Two WDM technologies were developed: Dense Wavelength Division Multiplexing (DWDM) for long haul transmission and Coarse Wavelength Division Multiplexing (CWDM) for metropolitan transmission. The first is very precise and very costly but supports hundreds of optical channels; the second is inexpensive and can be implemented on a variety of physical media but supports only 18 optical channels. CWDM is the appropriate technology for PON local access networks and DWDM is the right technology for Distribution and Transport Network inside the LHON (Long Haul Optical Network). CWDM can be easily implemented with point-to-point or point-to-multipoint topologies, but DWDM requires that optical channels be provisioned on specialized nodes.

    Synchronous Optical Network (SONET) and the Synchronous Digital Hierarchy (SDH) offer similar packet data containers of 155 Mb/s, 622 Mb/s, 2.25 Gb/s, 10 Gb/s, and 40 Gb/s. The next logical step would result in the evolution of these protocols to terabit rates as multiples of 1.3 Tb/s. At least 100, 1.3 Tb/s channels, can be placed inside a fiber-optic cable consisting of 20 fibers. If ten fibers are used to support one direction of transmission, and ten fibers the opposite direction, the resulting fiber cable capacity is equal to (10 fibers * 100 channels * 1 Tb/s per channel), or 1000 Tb/s (1 Petabit per second).
    In December 2006, the Ethernet Alliance (www.ethernetalliance.org) delegated the IEEE 802.3 Standards Project to the High Speed Study Group (HSSG). This group is forecasting that 100 Gb/s Ethernet could be the new IEEE standard for 2010. As bandwidth demands continue to require faster access networks, and hardware manufactures implement ever faster chip-sets, the next logical step would be a 1 Tb/s Ethernet protocol.


    1 Note: A terabit is about 10% less than a "tebibit" (sometimes abbreviated as a "tibit"), which is equal to 240 or 1,099,511,627,776 bits.
    2 Operating Expenses (OPEX) are the amount paid for asset maintenance or the cost of doing business, excluding depreciation. Earnings are distributed after operating expenses are deducted.
    3 Wireless technologies are not discussed here because it’s very difficult for wireless to break the 100 Mb/s barrier. In the future, better compression and modulation techniques may increase wireless speeds to 1 Gb/s, but that will still be too slow for many future services. Of course, wireless will continue to be widely used to support mobility services.

    Lire la suite...

    HTML5 au centre de l’avenir des applications mobiles

    29 avr. 2011 | Publié par Anouar L |
    Les applications web écrites en HTML5 vont-elles supplanter les logiciels natifs dans le monde mobile ? Rien n’est encore joué, mais les technologies web intéressent sans conteste les développeurs.

    L’HTML5 intéresserait selon un article de CIO India News 60 % des développeurs de services mobiles. C’est ce qui ressort d’une étude menée en Amérique du Nord et en Europe auprès de 2500 programmeurs.


    Le cabinet précise que le développement à destination des OS mobiles devrait continuer à monter en puissance en 2011. Les plates-formes les plus populaires restent iOS (56 % des intentions de développement sur iPhone et 36 % sur iPad) et Android (50 % des intentions de développement).
    Dans ce contexte, l’intérêt croissant pour les applications HTML5 n’a rien d’étonnant. Le mode web permet en effet d’éliminer en grande partie la problématique liée à la multiplication des plates-formes mobiles, ce qui participe à réduire les coûts de développement. L’HTML5 permet par ailleurs de proposer des applications web très proches de leurs équivalents natifs en terme de richesse fonctionnelle. Enfin – et c’est sans doute un point important pour certains développeurs –, les applications web permettent de s’affranchir des limites imposées sur les boutiques logicielles.
    Toutefois, le support de l’HTML5 au sein des terminaux mobiles reste avant tout lié au bon vouloir des concepteurs d’OS. Or, dans ce domaine, de mauvaises surprises sont parfois de la partie. Récemment, les développeurs ont ainsi découvert que le moteur JavaScript utilisé pour les applications web installées sur un iPhone était nettement moins rapide que celui présent dans Safari mobile. Les Web Apps boudées par la firme de Cupertino ?

    Lire la suite...

    Nokia se déleste de 7000 salariés en s'orientant vers l’adoption de Windows Phone

    | Publié par Anouar L |
    Dans le cadre de sa restructuration qui accompagne la réorganisation autour de Windows Phone, Nokia annonce la vente des activités de développement Symbian à Accenture.



    En orientant sa stratégie sur l’adoption de Windows Phone comme système d’exploitation pour ses smartphones, Nokia faisait peu de cas de sa plate-forme historique Symbian. Le constructeur finlandais vient de laisser tomber le couperet définitif en annonçant qu’il cède ses activités de développement logiciel Symbian à Accenture.

    Une opération qui s’inscrit dans le cadre d’une alliance stratégique lui permettant de réduire les dépenses opérationnelles de son activité Devices & Services, qui vise à économiser 1 milliard d’euros en 2013 par rapport à 2010. Une façon diplomatique d’annoncer un plan social. Ce transfert d’activités s’accompagnera d’un transfert de personnel. Pas moins de 3000 salariés de Nokia associés à cette branche devraient rejoindre les équipes d’Accenture. En échange, cet accord prévoit qu’Accenture fournira des applications et services pour l’OS Windows Phone supporté par les mobiles Nokia.

    Au moins, les concernés conserve une activité professionnelle. Ce ne sera pas forcément le cas des 4000 emplois que le constructeur entend supprimer d’ici la fin 2012, principalement au Danemark, en Grande-Bretagne et en Finlande. Les discussions dans ces pays avec les représentants des salariés ont déjà débuté. Le fabricant finlandais souhaite en effet rapidement consolider ses sites de R&D, dont certains ne devraient pas tarder à fermer.

    « Nous offrirons à ceux qui perdent leur travail une gamme d’options comme un support individuel dans la recherche de travail, une nouvelle formation pour faire de nouveaux investissements afin de promouvoir l’innovation et nous travaillerons avec de nombreux partenaires pour créer de nouvelles opportunités », déclare le P-dg Stephen Elop pour tenter d’amortir la violence de l’annonce.
    Lire la suite...

    Google poursuivi pour les mouchards de localisation d’Android

    | Publié par Anouar L |


    L’affaire des ‘mouchards’ des smartphones qui enregistrent les déplacements de leurs utilisateurs vient de rebondir à la face de Google aux Etats-Unis. Deux résidents du Michigan ont déposé une plainte, le 27 avril, auprès d’un tribunal de Detroit. Equipés d’un HTC Inspire sous Android, ils estiment que le suivi de leurs déplacements par leur téléphone est comparable à une mise sur écoute prononcée par un tribunal, rapporte l’agence Bloomberg.

    Les éditeurs de plates-formes mobiles sont sous les feux de l’actualité depuis que des utilisateurs ont constaté que l’iPhone conservait les données de localisation dans un fichier non crypté et stocké sur le PC/Mac lors des synchronisations iTunes du smartphone. Apple, Google et Microsoft ont reconnu les faits en expliquant que leurs systèmes se contentait de constituer une base de données des antennes GSM et hotspot wifi croisés lors des déplacements des utilisateurs afin d’améliorer les services de géolocalisation.

    Les méthodes de conservation des données divergent cependant selon les plates-formes iOS, Android ou Windows Phone. A ce sujet, Apple prévoit notamment de corriger le tir sur la durée de conservation des données de localisation (jusqu’à un an) et la protection du fichier concerné lors des prochaines mises à jours d’iOS. Mais en aucun cas les données ne seraient associées à des profils permettant d’identifier les clients, assurent les éditeurs. Les dirigeants des trois entreprises ont néanmoins été invités à s’expliquer sur la question devant une commission sénatoriale le 10 mai prochain.

    Quant aux deux plaignants du Michigan, ils espèrent transformer leur plainte en action de groupe (class action) en plus des 50 millions de dollars de dommages et intérêts réclamés et la demande d’arrêts des pratiques.
    Lire la suite...

    Guerre des brevets : le chinois Huawei attaque le chinois ZTE en Europe

    | Publié par Anouar L |
    Face aux silences de son concurrent, Huawei décide d'attaquer son compatriote ZTE pour viol de propriété intellectuelle. Une déclaration de guerre qui souligne la maturité des entreprises chinoises à l'international.

    Le numéro un chinois des équipementiers télécom et réseau compte bien se développer rapidement en Europe, où la concurrence est rude. Huawei utilisera toutes ses armes, quitte à se montrer très offensif en attaquant son compatriote chinois ZTE sur le sol européen.

    Après la présentation d’excellents résultats 2010 (28 milliards de dollars en hausse de 24,2% sur un an, pour une marge opérationnelle de 4,4 milliards de dollars, soit +31,4 %), Huawei annonce qu’il vient de déposer une plainte contre son concurrent ZTE auprès du tribunal de grande instance de Paris, ainsi qu’en Allemagne et en Hongrie. Objet de cette plainte : ZTE utiliserait des technologies pour lesquelles Huawei a déposé des brevets dans la conception de ses modems cellulaires embarqués et clés USB-modems, mais également dans la conception d’équipements d’infrastructure LTE (Long Term Evolution exploité sur les réseaux 4G). 
    En outre ZTE utiliserait illégalement la marque déposée Huawei sur certaines de ses cartes.
    Huawei précise que ces actions font suite à des courriers adressés à l’intéressé afin de lui demander de cesser ces violations et d’acquitter à payer les droits de licence. En outre, la société rappelle avoir sollicité ZTE « en de multiples occasions » afin de négocier l’utilisation croisée de technologies brevetées. Toujours sans succès.

    « Pour Huawei, les brevets représentent un investissement essentiel. En outre, nous participons activement aux comités de standardisation, notamment sur les technologies LTE », explique Song Liuping, responsable juridique de l’entreprise. « C’est pourquoi nous sommes l’un des leaders mondiaux sur ces technologies, autant sur le nombre de brevets que sur les produits commerciaux.» 
     L’équipementier déclare avoir dépensé 222 millions de dollars en 2010 pour utiliser des licences d’autres acteurs, et investi environ 2,5 milliards de dollars en recherche et développement.

    De son côté, ZTE s’étonne de l’initiative de son compatriote. « ZTE respecte sans réserve, et adhère, aux codes, aux pratiques et aux lois internationales relevant de la propriété intellectuelle, et rejette totalement le fait que des brevets ou des marques déposées puissent avoir été utilisés frauduleusement », déclare l’entreprise par voie de communiqué.

    Estimant, à juste titre, que les brevets font partie de son capital intellectuel, Huawei souhaite aussi montrer qu’elle défend son patrimoine et protège ses investissements. « Néanmoins, il ne s’agit pas pour nous d’en faire une activité ou une source de revenus, mais plutôt de nouer des accords croisés avec d’autres acteurs pour participer activement aux évolutions technologiques des télécommunications et des réseaux, souligne Song Liuping. Nous souhaitons nous développer en paix, en négociant ce type de coopération, plutôt que d’attaquer. Cependant, nous comptons bien défendre nos investissements. »
    Le conflit du jour s’inscrit comme un autre épisode de la guerre des brevets après les négociations Huawei/Motorola et plus récemment Ericsson/ZTE  autour des technologies 2G et 3G au Royaume-Uni, en Italie et en Allemagne.

    Une entreprise chinoise qui attaque une autre entreprise chinoise sur des brevets peut étonner. Pourtant, le directeur juridique de Huawei rétorque clairement : « Certes, nous sommes une entreprise chinoise, mais dont le capital qui est détenu par 60.000 de ses employés. Ces pratiques de défense de la propriété intellectuelle sont monnaie courante sur la scène internationale. Or, Huawei est justement une entreprise internationale. Cela illustre aussi la maturité des entreprises chinoises. »

    Lire la suite...

    Le marché du cloud dépassera les 240 milliards de dollars en 2020

    | Publié par Anouar L |
    L’institut Forrester prévoit une hausse colossale du marché du cloud computing, qui devrait passer de 40 milliards de dollars à 240 milliards de dollars en dix ans. Notamment grâce au SaaS.

    Dans son rapport Sizing The Cloud, Forrester dévoile que le marché du cloud computing devrait passer de 40,7 milliards de dollars en 2011 à 241 milliards de dollars en 2020. Le cabinet sépare son analyse en différents secteurs (infrastructure, plate-forme et applications) et types de cloud (public, semi-privé et privé).

    Plusieurs éléments ressortent de cette étude. Tout d’abord, la virtualisation du poste de travail semble avoir atteint la fin d’un cycle d’évolution. Toutefois, de nouvelles innovations technologiques permettront prochainement de relancer ce marché.

    Les solutions d’IaaS (Infrastructure as a Service) devraient atteindre un maximum de 5,9 milliards de dollars en 2014, avant de se stabiliser. Le côté ‘commun’ de ces offres mènera alors à une baisse des prix. Le succès de sociétés comme Amazon et Rackspace dans ce secteur serait donc en trompe-l’œil à moyen terme, la concurrence devant mener à une baisse importante des marges.

    Enfin, le SaaS (Software as a Service) devrait être le secteur qui connaitra la croissance la plus importante et la plus soutenue au fil des ans. Ce marché s’établissait à 21,1 milliards de dollars en 2011 et devrait atteindre les 92 milliards de dollars en 2016. Le SaaS est et restera donc une véritable locomotive pour le cloud computing.
    Lire la suite...