1 / 37

Broadband to Underserved Areas, a Target or an Enabler?

Access to Broadband “ Universal Service Opportunities and Challenges ” 4-6 March, 2005 Jolie Ville Movenpick Hotel, Sharm El Sheikh, Egypt. Broadband to Underserved Areas, a Target or an Enabler? «  IP Strategies and advanced visions to optimize network services/applications » by

pdrain
Télécharger la présentation

Broadband to Underserved Areas, a Target or an Enabler?

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Access to Broadband“Universal Service Opportunities and Challenges”4-6 March, 2005Jolie Ville Movenpick Hotel, Sharm El Sheikh, Egypt Broadband to Underserved Areas, a Target or an Enabler? « IP Strategies and advanced visions to optimize network services/applications»by Désiré Karyabwite, Eng. EPF - CH The views expressed in this paper are those of the author and may not necessarily reflect the opinions of the ITU or its membership.

  2. Table of Contents PART I : Telecom Infrastructure and Broadband – Enabler • Introduction • Challenges of Change: Broadband and universal service • e-Gov and Network Security: Creating trust in Critical network infrastructures! • Conclusions 5. Policy and Strategies PART II E-Gov Services/Applications in Underserved Areas

  3. PART I : Telecom Infrastructure and Broadband Enabler

  4. 1. Introduction Definition: Telecommunication Reference made to the ITU Constitution, the Convention and the Administrative Regulations of the ITU “Telecommunication: Any transmission, emission or reception of signs, signals, writing, images and sounds or intelligence of any nature by wire, radio, optical or other electromagnetic systems” (CS/An. 1012 page 52)

  5. Radio,TV TV, digital TV & Cinema Telephone Digital Phone Computer Internet 90’s Defining Convergence

  6. Convergence: Transport of Voice, video and Data on IP-based Networks (ITU PP, res 101 and Prog.3/WTDC 2002, Priority number one).

  7. Broadband Broadband brings convergence, and convergence brings change ... IP Telephony, e-gov, etc.

  8. …Can TV companies provide Telephony? …Can Telecommunication companies provide TV services? Source: ITU, Telecommunication Regulatory Survey, 2000 (Data includes all Member States that responded to the survey) …Competition …Broadband Wireless Access

  9. Multichannel Broadcast TV Fiber, PLC Audio/VideoStreaming DSL, Cable, PLC WWW MP3 V.90 E-mail, Chat, SMS V.34 Technology & application interaction

  10. Bandwidth Bandwidth required per streaming application Application usage 20Mbps More applications per household (audio streaming, video streaming, …) Compression techniques MPEG2 5Mbps Bandwidth requirements per household 2Mbps MPEG4 1Mbps time 1992 1996 2000 2002 MPEG Layer 4 or DivX. - ISO/IEC 14496-1:1999 : "Information technology -- Coding of audio-visual objects”

  11. 2. Challenges of Change: Broadband and universal service/Access IP-based Network Topology TE : Terminal Equipment PC : Personal Computer TEL: Telephone CPN: Customer Premises Network RP : Reference Point

  12. Open standard : DVB-RCS (Digital Video Broadcast - Return Channel System) (up to 8 Mbps downstream and up to 2 Mbps upstream or ….). Class 1 (0 to 150 ms for really time com) Tel. Com Class 2 (150 to 300 ms) bi-directional not really time Class 3 (300 to 700 ms) half-duplex Class 4 (> 700 ms) mil radio …

  13. H.323, H.248 (SS7/SIP) Gatekeeper PSTN (E.164) H.323, H.248 (SS7/SIP) Gatway IP Network GSM / 3G /4G (E.164….) Enabling QoS

  14. Congestion Scenario: TCP Traffic + VoIP Instantaneous Interface Congestion Core Typical 4:1 Data Over- Subscription Distribution Typical 20:1 Data Over- Subscription Access = Data = Voice

  15. Interconnection • The Internet dial-up model involves three different players: • The Local Loop Operator or ILEC (Incumbent Local Exchange Carrier) that interconnects the end user; • The Long Distance Operator or OLO (Other Licensed Operator) that collects and conveys the Internet traffic on a National basis; • ISP (Internet service provider) where the traffic is delivered by the OLO; ISP are usually located in one of the main cities of the country (often the capital)

  16. Direct connection ISP 1 ISP 2 IX Interconnecting via third party operated Internet Exchange Point ISP 3 ISP 4 Interconnections are the Key issues on Internet • Economy of scale advantages through interconnection over an IX: • cost for maintenance and administration • cost for equipment

  17. Two different types of interconnections; peering and transit. Peering: is an interconnection business relationship whereby ISPs provide connectivity to each others´customers Transit: From an ASP (Access Service Provider) to ISPs. The Internet business in most Countries is mainly based on transit bandwidth... It is the business relationship whereby one ISP provides (usually sells) access to all destinations in its routing table.

  18. Peering has emerged as one of the important and effective ways • for ISPs to improve and optimize the network efficiency. • ISP seek peering relationships with their competitors primarily for two • reasons: • to minimize transit costs. Peering decreases the cost and reliance on purchased Internet transit. • to avoid a transit provider hop in between. • This will lead to: • Access Customers will recognize a better quality of their Internet connection. • Opportunity to develop national Internet content and services that are dependant on low latency: • Sell access to Content Providers • E-commerce, E-banking, M-Commerce etc • Develop own services to strengthen the value of the network

  19. Topology: solutions when designing an IXP There are some different solutions when designing an IXP Layer 2 solutions: Switch as central traffic relaying device Layer 3 solutions: Router as central traffic relaying device

  20. Layer 2 Solutions • Advantages: • The ISPs/e-Gov control the traffic • Cheap for the IXP operator/e-Gov • Scalable • Etc.

  21. Layer 3 Solutions • Advantages: • The ISPs control the traffic • Cheap for the ISPs • Etc

  22. Internet Internet ISP 1 ISP 2 IX Business agreement between two ISPs and has actually nothing to do with the IX. Transit is a non-core business for an IXP/E-Gov. The objective is to keep the local traffic local.

  23. Interconnection: DVB-OBP

  24. Transformer (MV/LV) (10-30KV/ 0.4-0.110KV) Transformer Station (HV/MV) (110-380/10-30KV) up to 4.5 Mbps up to 45 Mbps FiberBackbone Low Voltage Network IP Connectivity and PLC (Power Line Communication) Medium Voltage Cable

  25. Period Major Technology Introduction New Internal/External Applications Up to 2000 2 G ·Telephone ·Email ·SMS ·Digital Text Delivery 2001 to 2002 2.5 G ·Mobile Banking ·Voicemail ·Web ·Mobile Audio Player ·Digital Newspaper Publishing ·Digital Audio Delivery ·Mobile Radio ·Karaoke ·Push Marketing/ Targeted programs ·Location-based services ·Mobile coupons 2003 and beyond 3 G ·Mobile videoconferencing ·Video Phone/Mail ·Remote Medical Diagnosis ·Remote Education ·Mobile TV/Video Player ·Advanced Car Navigation/ City Guides ·Digital Catalog Shopping ·Digital Audio/Video Delivery ·Collaborative B2B Applications 3G Mobile Services and Applications

  26. Estimated cost of GSM and 3G/UMTS networks Source: Gartner Dataquest

  27. “On the Internet, nobody knows you’re a dog…” 3. E-Gov and Network Security: Creating trust in Critical network infrastructures Danger can come from almost anywhere… Security concerns in the use of public networks (e.g. the Internet) is another handicap in providing some value-added services. This results in the use of expensive private networks for critical services that can only be afforded by large enterprises. For service affordability and their widespread use, security and trust should be part of infrastructure and e-gov services development

  28. SPAMS & Phishing What is Phishing? Phishing attacks use 'spoofed' e-mails and fraudulent websites designed to fool recipients into divulging personal financial data such as credit card numbers, account usernames and passwords, social security numbers, etc. By hijacking the trusted brands of well-known banks, online retailers and credit card companies, phishers are able to convince up to 5% of recipients to respond to them. Source Anti-Phishing Working Group

  29. 5. Conclusions • No doubt that Convergence/broadband access becomes a commodity service: • 30% of households by 2005 • 70% of households by 2010 • Still some uncertainties : • Related to home environment • Content delivery model • Technological advances in terminals & access will make broadband access an affordable service for 70% of the population before 2010 • E-Gov and Security: • A big Challenge !!!! $$$$$$$$

  30. What will the challenges (technical, regulatory, policy, business models, etc.) be during the e-gov transitional period? • What can you advise as regards investment policies (when, how much, where)? • How can you accelerate e-gov ?

  31. PART II E-Gov Services/Applications in Underserved Areas

  32. 5. Policy and Strategies • Best practices for DNS and IP addresses Management (all e-Gov resources) • Governing Law and Dispute Resolution • Clear responsibilities E-Gov / IXP/ Member Responsibilites • Clear policy • Fees • Clear National e-gov Strategies • Clear business Strategies (for each service/application)

  33. IP based Network COSTA RICA IP Network Covering the territory of the country 100’000 customers (IP penetration : 0.4 per habitant)

  34. Burkina Faso : E-Government Project

  35. The decision to be made is on having Bi-lateral or • Multi-lateral peering agreements to rule over the traffic exchange over the IX: • Multi-lateral peering agreement implies that all connected ISPs must peer with all other ISPs connected to the IX, on the same conditions. • Bi-lateral leaves it to the ISP to decide with whom to peer and on what conditions, but they must have peering agreements with at least two if they want to use the IX for e-gov. Procedures • Joining • Termination • Payment of fees Documents • Policy of IXP • Connection agreement • Service definition

  36. Thank you for your Attention For more details: www.itu.int/itu-d Désiré KARYABWITE   IP Coordinator, E-Strategy Unit, Email: desire.karyabwite@itu.int Tel: +41 22 730 5009 Fax: +41 22 730 5484

More Related