The use of wide area network fibre optic and SDH technology
Transcription
The use of wide area network fibre optic and SDH technology
THE USE OF WIDE AREA NETWORK FIBRE OPTIC AND SDH TECHNOLOGY BY UK PLC MARCH 2006 Reference to any specific commercial product, process or service by trade name, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favouring by CPNI. The views and opinions of authors expressed within this document shall not be used for advertising or product endorsement purposes. To the fullest extent permitted by law, CPNI accepts no liability for any loss or damage (whether direct, indirect or consequential and including, but not limited to, loss of profits or anticipated profits, loss of data, business or goodwill) incurred by any person and howsoever caused arising from or connected with any error or omission in this document or from any person acting, omitting to act or refraining from acting upon, or otherwise using, the information contained in this document or its references. You should make your own judgement as regards use of this document and seek independent professional advice on your particular circumstances. Contents Executive summary............................................................................ 3 Scope and approach .......................................................................... 4 References .......................................................................................... 5 Definitions and abbreviations ........................................................... 6 SDH and fibre infrastructure in the UK............................................. 9 End user services............................................................................. 16 Security and resilience .................................................................... 24 Conclusions and recommendations............................................... 28 Appendix A: Ofcom telecommunications report 2005 .................. 30 Appendix B: Service providers, carrier operators and equipment providers ................................................. 49 Appendix C: BT 21st century network............................................ 54 Appendix D: Evolution of SDH ........................................................ 56 Appendix E: Element and network management .......................... 61 Appendix F: Regulatory position .................................................... 65 Bibliography...................................................................................... 67 History ............................................................................................... 67 2 Executive summary This report examines the SDH and fibre optic infrastructure in the UK and considers its importance in terms of supporting critical national infrastructure and its vulnerability to electronic attack. SDH has become the preferred telecom transport technology to support premium services in the UK since 1990. Since 1997 some routes have been enhanced through combination with WDM which has substantially increased fibre transmission capacity and reduced the ‘per bit’ transmission costs. More recent standards developments have led to formal definitions for WDM technologies under the title ‘Optical Transport Network’. The standards are under active development, particularly to make SDH more efficient in carrying data services such as Ethernet and in providing better operational flexibility and improved customer control. SDH supports the public voice telephony service, the Internet, mobile network services and corporate networks. Without SDH these services could not operate and therefore would be unable to support the critical national infrastructure. The market situation of each of these telecom services is examined as a way of indicating the size, and by implication the importance, of each. Private circuits are used as a way of providing interconnection capacity to other operators to enable them to build their own networks and to provide their own services. In effect private circuits are an intermediate stage between the end user services and the SDH network, although they are sold as a service to other network operators. In its present form SDH offers a high degree of resilience against network failure and some security against electronic attack, noting that the security is only as good as the associated security policies and their implementation. There are potential opportunities for compromise if an attacker were to gain access to the data communications network or to the management system. Unauthorised access to network or element managers could lead to major service disruption, but providing that security policies are carefully implemented the disruption could be contained. Unauthorised access to the higher level management systems could allow billing or service levels to be compromised. In the UK, by far the most transmission capacity is provided by BT, though changing regulation has ensured that other network operators now provide significant infrastructure, particularly within and between major towns and cities. Because of its dominance in terms of available infrastructure, special consideration is given to the BT network as well as general consideration to other networks. Given the open source nature of this report, a number of recommendations are made for further study which would involve specific discussion with Telecoms Equipment, Service and Network Providers. 3 Scope and approach This report describes the use of ‘Wide Area Network Optic and SDH technology by UK PLC’ and will be used by NISCC in their role to protect the UK Critical National Infrastructure (CNI) against an electronic attack. The report sets out the UK environment in terms of Services, Providers, Technology and the Regulatory position using open source material identified and listed in the reports reference section and bibliography. This report is also a reference for the sister report on the use of ‘Submarine Cable technology in UK PLC’ to avoid duplication. Operators who own SDH infrastructure also offer telecommunications services (such as fixed voice or corporate data), but service providers do not always own SDH and fibre infrastructure. Instead they lease transmission capacity from one of the infrastructure (or ‘facilities’) providers through private circuits. Whilst private circuits may be supplied on either a wholesale or retail basis, in fact they provide a means to construct a network to deliver an end user service and therefore lie between ‘infrastructure’ and ‘end user services’. In order to assess the dependency of the CNI on this technology, the UK SDH and fibre optic infrastructure are described and the nature of private circuits is examined. Next the overall UK telecom market and each major end user service is assessed by analysing market information. The major services identified are: • Fixed line voice • Mobile • Internet • Corporate data Liberalisation and regulation in recent years have had a major impact on shaping the industry and in ensuring competition and diversity in suppliers. The effect of regulation on each service is therefore examined and the relationship of the service to the SDH and fibre infrastructure is discussed. The dependency of each service on SDH and fibre infrastructure is then summarised. For each service the relevant market leaders are identified and their location and contact details are listed in an annex to the report. Following this analysis the key features of SDH and fibre optic technology are examined and the dominant technology issues identified as the first stage in an assessment of the security and resilience. Given the open source constraints of this high-level study, specific security issues are not detailed however areas of potential concern are identified. These can be used in any follow-up discussions with the providers, as it is only the providers who can validate and comment authoritatively given the sensitivity surrounding potential vulnerabilities. Finally, conclusions are presented and recommendations made on how this report could be taken forward. NB. This report was produced from open source information and without direct contact with any Telecom Equipment, Network or Service Providers. 4 References For the purposes of this document, the following references apply: 1. ‘Communications Market 2005 – Telecommunications’, Ofcom Report: http://www.ofcom.org.uk/research/cm/cm05/. 2. BT Products and Services: http://www.bt.com/b4b/b4b_campaign.jsp?BV_SessionID=@@@@0545397933.1141318 432@@@@&BV_EngineID=ccccaddheflfkmhcflgcefkdffndfni.0&EditorialName=private_cir cuits&UserSegment=SME&obsNoSee=Y&vStore=1302&obsPage=/b4b/b4b_sme_ps_hub .jsp&obsNoSee=Y&vStore=1302&obsPag 3. BT Wavestream Connect service http://www.btindirectchannels.com/index/products/products-portfolio-ict/products-portfolioict-wavestconnetnat.htm 4. BT 21st Century Network: http://www.btplc.com/21CN/?com.bea.event.type=linkclick&oLName=link.searchresults&o LDesc=KB_568 5. Cable and Wireless Network: http://www.cw.com/our_network/worldindex.html 6. ntl Network: http://www.ntl.com/mediacentre/thecompany/ntlnetwork/ 7. Global Crossing Network: http://www.globalcrossing.com/xml/network/index.xml 8. Colt Network: http://www.colt.net/our_infrastructure 9. Surf telecom Network: http://www.surftelecoms.co.uk/network.html 10. UK Core Transmission Network for the New Millenium, I. Hawker, G. Hill and I. Taylor: BT Technology Journal, July 2000, Vol 18 No.3, July 2000 11. Generic requirements for operations based on the Telecommunications Management Network (TMN) architecture; Bellcore, Generic Requirements GR-2869-CORE, Issue 1, October 1995 5 Definitions and abbreviations Definitions For the purposes of this document, the following terms and definitions apply: Dominant technology issues Those technology issues which are likely to have the greatest impact on the security and resilience of the CNI Private circuits or leased lines A point to point private line used by an organisation to provide a telecommunication connection between remote sites Dark fibre The name given to optic fibre that is not yet used 2G mobile Digital mobile network system with basic capability for supporting data services such as SMS 3G mobile Broadband digital mobile network system with advanced capability for supporting data services such e-mail and web browsing DSL Digital Subscriber Line system, a technology which enables a copper telephone pair to deliver high speed broadband data to customers Cable modem A customer unit that enables high speed broadband data to be carried over a cable TV system channel. The equivalent equipment at the CATV hub is called a Cable Modem Termination System. WiFi The name commonly given to a set of standards that define the requirements for transmitting data over a wireless local area network. WiMax The name commonly given to a fixed wireless metropolitan area network standard that is being developed for metropolitan area applications. Carrier Pre Selection A service offered by BT and Kingston Communications to customers which allows them to opt for certain defined classes of call to be carried by an operator contracted in advance, without having to dial a routing prefix or follow any other special procedure Bluephone A handset product developed by BT that can route phone calls over either a fixed or mobile network 6 Abbreviations For the purposes of this document, the following abbreviations apply: 21CN 21st Century Network 3GPP 3rd Generation Partnership Project ADM Add Drop Multiplexer ADSL Asymmetric Digital Subscriber Line Alt-Net Alternative network supplier ASTN Automatic Switched Transport Network ATM Asynchronous Transport Mode BLSR Bidirectional Line Switched Ring CNI Critical National Infrastructure CPS Carrier Pre-Select DCM Dispersion Compensation Module DMSU Digital Main Switching Unit DSL Digital Subscriber Line DSLAM Digital Subscriber Line Access Module EDFA Erbium Doped Fibre Amplifier EM Element Manager EMS Element Manager System FDM Frequency Division Multiplex GbE Gigabit Ethernet GDP Gross Domestic Product GFP Generic Framing Protocol GMPLS Generalised MultiProtocol label Switching GSM Global System for Mobile communication IP Internet Protocol ISDN Integrated Services Digital Network LAN Local Area Network LCAS Line Capacity Adjustment Scheme LLU Local Loop Unbundling MMS Multimedia Message service MPLS Multi Protocol Label Switching NACC Network Administration Control Centre NE Network Element NGS Next Generation System NMS Network Management System NOC Network Operations Centre OAM Operations, Administration and Management 7 OSS Operational Support System OTN Optical Transport Network PCP Primary Cross-connection Point PDH Plesiochronous Digital Hierarchy PSTN Public Switched Telephone Network QoS Quality of Service RPR Resilient Packet Ring SDH Synchronous Digital Hierarchy SLA Service Level Agreement SME Small and Medium Enterprises SMS Short Message Service TDM Time Division multiplex VCAT Virtual Concatenation VoIP Voice over Internet Protocol VPN Virtual Private Network WAP Wireless Application Protocol WDM Wavelength Division Multiplexing DWDM Dense Wavelength Division Multiplexing 8 SDH and fibre infrastructure in the UK Industry structure Fibre system deployments SDH has been deployed in the UK since around 1990 and is now the predominant transport method for carrying telecommunications signals over fibre. Prior to that time PDH had been the main high capacity transport technology since 1980 and indeed was being installed until the late 1990’s. As demand for capacity grew, the first optically switched and optically amplified WDM systems in the UK were introduced by BT in 1997. These early WDM systems were designed to be able to support both PDH and SDH signals. Since these early WDM systems were introduced higher capacity systems better able to support internet and data services have also been deployed. The growth in capacity of digital systems is illustrated in Figure 1. WDM Optical technologies EDFA … Raman Single-mode fibre Multi-mode fibre 160λ 80λ 1 Tb/s 32λ 16λ 8λ Capacity (log scale) 40Gb/s 10Gb/s 4λ 2.5Gb/s Optical networking? 565Mb/s 140Mb/s 34Mb/s 8Mb/s 2Mb/s 1980 1985 1990 1995 2000 Year Plesiochronous digital hierarchy Electrical transport Synchronous digital hierarchy Figure 1 Technology trends in fibre systems This shows how multimode fibre gave way to single mode fibre, how PDH gave way to SDH and how WDM technology was introduced. It should be noted that although the design capacity of the highest capacity systems exceeds 1Tb/s, in practice the ‘lit’ and ‘revenue earning’ capacities of these systems is much lower in practice. The design capacity is therefore an indication of potential to grow, rather than an indication of traffic carried. Currently the technology trend is not to seek increased capacity and range, but towards making transport networks more adaptable to the needs of data networking. This trend is discussed later. 9 Transport network providers With 7.3 million miles of installed optical fibre, BT owns by far the biggest transport network infrastructure in the UK and in effect provides network coverage across 100% of the country. Access to the BT fibre network infrastructure is made available to other operators through private circuit services [2] or, for higher capacities, through the Wavestream service [3]. BT now claims to provide services to more than 600 fixed and mobile operators and service providers across the UK. Liberalisation and regulation has enabled a number of competing carrier network operators to enter the field and several of these have installed their own infrastructure, also based on fibre, SDH and WDM. Cable and Wireless claim to have the second largest UK fibre network [5] with a presence in more than 100 UK cities. Following their acquisition of Bulldog they announced plans in 2004 to expand into the local network through local loop unbundling arrangements, with a presence in 400 exchanges. Cable TV service providers’ ntl and Telewest also have extensive regional fibre networks (e.g. [6]) that interconnect with their national networks and provide distribution via cable modem feeders. The networks are used to provide carrier services (e.g. for corporate networks) as well as broadband data and CATV. The ntl network contains 7,800 fibre km and they (also) have claimed this to be the second largest fibre network in the UK. However much of this will carry FDM channels for video and broadband distribution rather than SDH. Global Crossing’s UK network [7] was scheduled for completion in Q2 2005. It has a Lucent Technologies DWDM core providing a potential capacity at each of seven core nodes of 320 Gbit/s, and the capability to support 40 10-Gbit/s channels on any route. The Global Crossing UK core interconnects with Global Crossing’s international optical transmission network, allowing for global service delivery. The COLT network [8] links 13 fully-integrated data centres in 11 major European cities, providing very high reliability and security for corporate networks. The connected cities are: Amsterdam , Barcelona , Berlin , Frankfurt , London, Madrid , Paris, Rome, Turin and Zurich Surf Telecoms have a fibre network [9] extending over 1600 km in the South West peninsular and into southern Wales. Products include dark optical fibre, carrier wholesale bandwidth, communications sites, and regional leased lines (non-switched) for the corporate, business, educational and utility sectors. Details of leading network infrastructure providers are given in Appendix 2. Each network infrastructure operator buys from the major equipment providers, which results in a range of equipment designs, technologies and architectures. However the interfaces are standardised so that equipment from different suppliers will interwork. 10 The BT fibre optic network The BT PDH network The first commercial fibre systems were installed in BT’s UK network in 1980. These carried low bit rate PDH services over multimode fibre. PDH systems with faster 565Mb/s rates were introduced around 1985 and these continued to be installed into the late 1990’s. From 1985 BT also invested in extensive single mode fibre cabling, typically using 96-fibre cables from around 1990. Once the cables were installed BT saw it as economic to continue deploying low cost PDH systems, even though higher capacity SDH systems were available by 1990. Because of the widespread use of 565Mb/s PDH the fibre cables progressively filled with these low system capacities. Many of these PDH systems are still in use, mainly supporting the PSTN and occupying many of the cable fibres, although they are now likely to be phased out as BT introduces its 21st Century Network. Apart from cost, another reason it has taken time to replace them is that they have also carried some premium leased line services (Kilostream or Megastream) and changing over to SDH requires customer notification which is manually intensive and therefore expensive. The BT SDH network architecture Overlapping with the PDH deployments, BT’s first SDH systems were introduced around 1990, principally to serve the premium 2 Mb/s leased line market. The network architecture was arranged in 4 tiers as illustrated in Figure 2 [10]: Wideband Access: 50,000 Sites 40% of Cost Access Tier 2: 500 Nodes 20% of Cost Tier 1: 50 Nodes 10% of Cost Tier 3 Small Towns & Suburbs Tier 3: 2000 Nodes 30% of Cost Outer Core Tier 2 Large Towns Tier 1 Cities Tier 0: International Backhaul Frontier Stn Frontier Stn Figure 2 The BT SDH network. Source: BT Technol. Jnl., July 2000 11 Tier 0 is a network providing very high capacity connections between the sub-sea frontier stations and the international switching centres in London. Generally these are very high capacity SDH/WDM point to point systems, with connections to the major international gateways in London and Madley. They may take the form of point to point systems with fast 1+1 protection or automatically protected rings. Tier 1 is a high capacity, intercity network connecting about 170 core nodes. The Tier 1 network mostly uses point to point connections and is fully meshed so that capacity can be readily allocated on demand. Large cross-connect switches at the nodes provide the flexibility to configure circuit connections and a range of other features to support network operations. A very high level of network protection is provided based mainly on 1+1 automatic protection which provides milliseconds switch-over to a diverse route in the event of failure. Diversity usually dictates a link on a different cable route, but in some cases it may be a different cable on the same route, or a different fibre pair in the same cable. Possibly in some cases where capacity is in short supply 1+N protection may be provided (i.e. where 1 protection circuit protects N working circuits). Open sources do not provide this level of detail. Regional networks in Tier 2 connect approximately 1000 towns on to SDH rings. Add-drop multiplexers on the rings allow traffic to be conveniently added or dropped as well as providing other network operations features. Rural and city SDH rings in Tier 3 connect well over 1000 local exchanges. These largely provide infill with city and urban areas and extend the reach of SDH into the outer core. Tier 2 and Tier 3 SDH networks usually employ rings for resilience (if one part of the ring fails the traffic can be rerouted via the complementary section of the ring). In addition to these tiers there is also a ‘super tier’ between tiers 1 and 2, providing interconnection between several tier 2 rings. SDH systems also connect to more than 1000 large customer sites at 155 Mb/s and above and to other operators. BT is thought to have 9 Network Operations Centres (NOC) at regional locations such as Manchester and Cambridge and an overall Network Management Centre at Oswestry for operations personnel. Each is supported by a Network Administration Computer Centre (NACC), which contains the associated computer equipment. All facilities are duplicated at a remote location for disaster protection, although distances between NOC and back up facilities are not known. 12 Meeting growth in the BT transport network The resulting network was very flexible but was not easily scalable and proved expensive as demand for capacity increased in the late 1990’s. By 12/2000 the network had been expanded to give increased tier 1 coverage with links to the global backbone. Expansion of the SDH network has no doubt occurred since this time, but details are not known. TO WATFORD WOOD GN COLINDALE WOOD GN COLINDALE ITC ITC ILFORD EALING CITY EH CITY EH ELTHAM CVL CROYDON IE ELTHAM CVL CROYDON NT NT CE CE LS PR Existing tier 1 New tier 1 Principal tier 2 DOCKLANDS ITC KINGSTON GW ITC KINGSTON GW IE ILFORD EALING DOCKLANDS TO SLOUGH MR WA By 30/9/99 By 31/12/99 By 30/6/00 DC SF NG WV BM CV MR WA CB BM LE CV IH GR WF IH WF OF RG OF RG CY BS CB MQD MQD GR DC SF NG WV LE LS PR GI CY BS GI SO SO Figure 3 Tier 1 and principle tier 2 Figure 4 Broadband 10Gb/s overlay network by 12/2000 Sources: BT internal presentation and BT Technol. Jnl., July 2000 A new flexible and scalable network infrastructure was introduced from 1998 with a significantly lower cost 10 Gb/s broadband overlay network. Broadband traffic that was previously carried on the earlier SDH network was migrated across to the overlay, releasing capacity to support the growth of narrowband traffic on the earlier network. This broadband network had 80 nodes and 35 rings by 6/2000. The map shows the main rings only. The broadband overlay was able to efficiently handle churn of 155Mb/s services, but the 10Gb/s channels were insufficient to handle churn at 2.5Gb/s, as needed by IP services. By this time WDM technology offering 16 wavelengths per fibre became available and was introduced on some routes where fibres were in short supply. From 2000, as the Internet traffic grew even the broadband 10Gb/s network became inefficient in carrying this traffic and an ‘IP over WDM’ network (named ‘Colossus’) was introduced by BT. 13 WOOD GN COLINDALE ILFORD EALING CITY DOCKLANDS GW KINGSTON EH IE ELTHAM CVL CROYDON NT CE LS PR Colossus Other routes working or ordered Planned routes MR WA DC SF NG WV BM LE CV CB MQD GR IH WF OF RG CY BS GI SO Figure 5 BT WDM networks 12/2000 Source: BT internal presentation Private circuits Fibre infrastructure providers (also known as ‘facilities providers’) generally offer a range of private circuit services to operators of service networks (or service providers). Private circuits provide fixed, high-performance connections between two locations and enable others to build their own higher level service networks without installing their own transmission infrastructure. The circuits are permanently available and are supported by Service-Level Agreements (SLA). Private circuits are used in a variety of different network applications and are able to carry voice, mobile, data and Internet traffic. Their capacities range from around 2.4kb/s to 622 Mb/s. Private services offering capacities of 2Mb/s or below are usually delivered to customer premises via copper pairs (which can also handle up to 8Mb/s). Services of 8Mb/s and higher are delivered by fibre. Because they are a premium service they are usually provided over a resilient (automatically protected) system and they are often fed via an SDH add-drop multiplexer (ADM). They may be supplied either as a retail product to a company to enable them to build their own, usually small-scale, private network, or they may be provided as a wholesale product to another public network operator. Traditionally leased lines have been provided using ‘circuit’ techniques, but packet based (virtual) private circuits and also wavelength multiplexed circuits are also now available. 14 Examples of circuit based private circuit services include: • BT’s Kilostream/Kilostream N which offer services from 2.4 kb/s to 1024 kb/s and which are used mainly for connecting phone systems and smaller LAN’s. • BT’s Megastream which offers connections from 1.5, 2, 34, 45, 140, 155 and 622 Mb/s bandwidths and which is mainly used for voice and data backbone networks. Megastream Longlines offers the ability to aggregate multiple individual circuits routed from multiple customer sites onto a single 155Mb/s bearer. Lower speed Megastream circuits up to 8Mb/s can be delivered via copper or fibre. • BT’s International Private Circuits. • ntl’s Point to Point Leased Lines. • Global Crossing provides private circuit services in the range 2 to 34 Mbit/s. Examples of packet based private circuits include: • BT Ethernet Private Services are point to point or point to multipoint connection oriented data services. They provide transparent, symmetrical, uncontended bandwidth from 200kb/s to 100Mb/s, with customer interfaces at speeds up to and 1000baseT • ntl’s Internet Leased Lines (which offer connections ranging from 2Mb/s to 45Mb/s with 1 to 1 contention). Wavelength services are a very high capacity form of private circuit. Examples of wavelength services include: • BT Wavestream which provides a fibre point to point service using dense WDM and providing bandwidths up to 80Gb/s. Wavestream services are aimed at interconnections for large data centres for real time information back up, information storage and disaster recovery. The service is also used for network consolidation following company mergers. • Dark fibre is also available from some suppliers such as Surf Telecoms. 15 End user services Identification of major services Optical fibre technologies provide reliable, high capacity, network connections which the telecommunications industry currently relies on heavily to provide a wide range of services to end users. A comprehensive review of these services is provided by the Ofcom report ‘Communications Market 2005 – Telecommunications’ (see Appendix A). This is perhaps the most comprehensive view of the UK telecoms market that is openly available and an analysis identified fixed line telephony, mobile telephony and data, the Internet and corporate data as the major telecommunications service categories. Without fibre and SDH, these services would not operate. Critical national infrastructures depend on all of these services and therefore on the fibre and SDH infrastructure. As it is beyond the scope of this report to examine all service dependencies on SDH the following approach is adopted. First an overall view is taken of the telecoms market to assess its size, and then each individual service is considered in turn. For each service a view is given of its market status and key players, and the impact of regulation on the service is discussed. Finally the relationship of the service to SDH is examined. The resilience and security of each service depends in part on the SDH network and this is considered in the following section so that conclusions can be drawn. In this section no distinction is drawn between SDH and WDM regarding dependencies. The reason for this is that SDH can only operate over optical fibre cables while the primary function of WDM is to increase the capacity that a single fibre can carry. WDM is therefore particularly applicable on those routes where traffic capacities are highest. Size of the UK Telecoms market In their market report of 2005 (Appendix A) Ofcom reported that the size of the telecom market had progressively increased since 2000 and that the value in 2004 was £44.6 bn of which £36.1 bn was retail and £8.6 bn was wholesale. The value added by telecom markets to GDP in 2004 was estimated as £26.7 bn, or 2.8% of GDP. Although BT was by far the largest operator in the UK in 2004, its overall market share had fallen to 41% (lower than most other European incumbent operators) while mobile network operators held a combined share of 34%. In 2004 revenues from mobile voice and data exceeded the revenues from fixed voice and access for the first time. Internet and broadband, followed by corporate data services were also identified as major revenue earners, though at rather lower levels than fixed voice and mobile. Ofcom also estimated that businesses accounted for almost a half of all end user spending on the main telecom services in 2004, amounting to over £14 bn. 16 Fixed line voice services Call volumes and exchange lines Call volumes over the fixed voice network has been declining slightly in recent years, as too has the number of exchange lines [1]. This is partly due to mobile call substitution, partly to broadband substituting both ISDN connections and second lines for Internet access and partly due to other forms of substitution such as e-mail or SMS messaging. Fixed line voice operators By far the largest fixed line voice network is owned by BT. Consequently many alternative voice network providers depend on the BT infrastructure for their services. In a strategic review which commenced in April 2004, Ofcom considered that competition was not effective in all areas needed to provide voice network services. Following the review and consultation, BT has launched a new company called Openreach to deliver installation and maintenance services on behalf of alternative telephone and Internet service providers. Openreach, which includes almost all of the BT field engineers, is required to provide a service to all service providers on an equal basis and at the same price. Its products will include Local Loop Unbundling, Wholesale Line Rental and Backhaul products. Ntl, Telewest and some others have their own infrastructure on a much smaller scale. But the majority of voice network providers lease capacity from BT. This study has not identified the relative sizes of the other service providers but they include major companies such as Telecom Plus, Onetel, Eurexel and Toucan. Fixed and mobile Although fixed voice call volumes have been falling and mobile calls growing, there seems no likelihood in the near future that mobile will replace the fixed line market. The number of households with mobile phone only is 9% and that with fixed line only is 10%, with the majority of households owning both fixed and mobile. This indicates that mobile complements fixed, rather than substituting it, although there may be a small element of substitution. VoIP VoIP technology allows users to make voice calls over data networks and particularly the Internet. Calls can be made directly between users over the Internet, or between the Internet and the PSTN, within the PSTN or within corporate networks. Voice over IP is perhaps a greater threat to the conventional circuit switched PSTN than mobile and many operators are starting to use VOIP technology within their networks. BT for example is now well advanced in its plans to replace the PSTN with its 21st Century Network (See Appendix C) which will carry voice using the VoIP protocols. 17 Some large UK corporates are moving to a VoIP platform: all large businesses have high bandwidth IP connections so the benefit for them is free calls between corporate sites. The Skype service is also proving very popular for both business and residential users who have broadband, particularly because of free or cheap international calling, and also because of its ease of use. Skype claims to have downloaded 250m copies of its free software. Vonage have also launched a VoIP service in the UK. Following this, BT launched its own VoIP service to broadband customers and also an SME service. The impact of regulation on fixed voice Regulation has had a significant impact on the fixed voice market by creating conditions that facilitate carrier pre-selection (CPS) voice services, including the provision of a wholesale line rental product from BT. Increased competition has led to innovative tariff changes such as increased line rental in exchange for lower average call prices, or simply a flat rate charge per month. With consumers also being willing to switch to a cheaper provider there has been a reduction in total revenues for the fixed voice network. Although CPS services have taken an increasing share of the market in recent years (see Appendix A), BT remains the dominant provider, particularly for SME’s. Recent regulatory action has led to the creation of BT Openreach as a separate company. This will help to ensure fairer competition between BT provided voice services and competing services that depend on the BT network infrastructure (see section 5.2.2). Dependency of fixed voice on SDH In the UK a high proportion of the PSTN traffic is thought to be carried over legacy PDH systems (which also depend on the fibre infrastructure) with a smaller proportion carried over SDH channels. Alternative network operators such as ntl and Telewest are thought to use SDH for their voice networks. Some other operators (e.g. Telecom Plus) lease capacity from other infrastructure providers and so are likely to also depend on SDH. The extent and detail of these arrangements is not known. As BT plan to replace their circuit switched PSTN with VOIP by 2008 (see Appendix 3) it seems likely that the PDH equipment will be replaced by a SDH/OTN (Appendix D). Mobile services Three generations of mobile Mobile services are now entering their ‘third generation’. First generation mobile was voice only and was based on analogue techniques. This has been replaced by second generation (2G) networks which are based on digital encoding and which also allow basic multimedia services such as SMS messaging to be carried. 2G networks are widely used and most networks now cover 99% of the population [1]. However the small bandwidth available in 2G networks has been insufficient for higher quality multimedia services and so in recent years mobile companies have been investing in 3G technology which will enable networks to carry broadband signals (typically 384 kb/s rising to 2 Mb/s) to and from a mobile device. In 2004 and 2005 the 5 principle mobile operating 18 companies (Appendix 2) introduced 3G networks as a complement to their 2G networks (rather than as a replacement) with seamless handover when passing from one network to another. Population coverage of the new networks in early 2005 ranged from 30% to 70% (and this is no doubt growing), compared to 99% which is typical for 2G networks. The services that are unique to 3G are video calling and video streaming. The broadband transmission rates that are now available should also make existing services more appealing. However in order to take full advantage of the 3G networks, a new range of mobile devices and services has proved necessary. New devices are appearing but initial growth in take up and usage of the services began slowly. (The reasons for this are discussed in Appendix A). As 3G usage increases and higher speed data services are taken up the outlook is that the fixed network interconnection capacity required by mobile services will increase in coming years. A more detailed view of the mobile market, based on the Ofcom report ‘The Communications Market 2005 – Telecommunications’, is given in Appendix 1. Mobile operators The principle mobile network operators are: • • • • • Vodaphone O2 Orange T-Mobile 3UK The impact of regulation on mobile Unlike the fixed voice market there have been several main players in the mobile market with a broadly similar market share and competition has been keen for several years. As a result regulation has perhaps been lighter than for fixed voice. One area affected by regulation is spectrum usage: radio spectrum is a scarce commodity and bids for spectrum come from diverse groups, including from the military. The other area relates to interconnection charges: earlier high prices for interconnecting from fixed to mobile and between mobile networks have been reduced through regulation. Keen competition between the mobile operators has served to ensure prices are held down. Dependency of mobile on SDH Mobile networks have a cellular radio part and also a fixed network part. The radio part provides a network of base stations which can transmit and receive radio frequency signals to and from mobile devices. The fixed part provides interconnections between the base stations and the exchanges. It also provides the longer links needed between the different exchanges. Both parts of the fixed transmission network are normally provided via private circuits. Lower capacity private circuits to remote base stations are likely to be carried by bunched copper pairs, using for example a low rate BT Megastream service or equivalent. Where base station traffic is aggregated and higher capacity is needed aggregating services such as the BT 19 Megastream Longlines service, can also be used. For the higher capacity connections between exchanges SDH links would be essential. Every single mobile call in the UK must be carried across some part of the fixed network (in some cases this may be over fixed SDH microwave links). The dependence of mobile on fibre/SDH therefore is approaching 100%. Internet This section deals specifically with Internet services for consumers and SMEs. Corporate large bandwidth Internet services are considered part of the Corporate Data services in section 5.5. Access methods Access to Internet services can be via several methods. Narrowband access via the PSTN has in effect been covered already in the section on voice networks. Access via leased lines and ISDN are possible but they are at a low level and declining. The main method for Internet access in the UK is now via broadband and a number of flavours are possible. Several types of technology solution are used, including DSL over copper pairs, cable modems and fixed wireless access. Broadband mobile wireless access was discussed in the previous section and satellite access is generally available but is rarely used because of its high price. Competition in broadband access can be either at the facilities (or infrastructure) level, or it can be at the services level. Three main players provide infrastructure for broadband access: BT through its copper pair network and ntl and Telewest through their cable TV networks. In addition, some infrastructure is provided by via fixed wireless access and satellite. At the services level consumers with access to ADSL are able to choose from more than 20 broadband ISP’s. Growth of broadband Broadband access has grown rapidly in recent years and has now become a mass market consumer product, with more than 7.5m broadband connections in May 2005. Ofcom [1] has reported that this growth has been driven by two major factors: BT’s widespread deployment of DSL systems to make broadband available to 99.6% of the population by December 2005 and by falling prices, driven by competition. As the broadband service availability has increased and the price differential between narrowband and broadband decreased, customers who previously used dial up or unmetered access are migrating to broadband and this is leading to increased revenues from broadband services. Access speeds have also risen in the past two years. Previously 512 kb/s was the norm, but now 1 Mb/s is commonplace and 2 Mb/s widely available as a premium service with 512 kb/s as a discount option. This increase of speed seems set to continue and companies such as Bulldog and UK Online now offer 4 Mb/s and 8 Mb/s services. As next generation technology is introduced speeds of around 20 Mb/s should be possible. 20 Operators and market share The main providers of broadband infrastructure: • BT • Ntl • Telewest The main broadband service providers: • • • • • • BT Ntl Telewest Wanadoo AOL Tiscali Further details of the providers are given in Appendix B. Although the number of broadband customers served by BT virtually trebled in 2004, BT’s proportion of subscribers fell slightly from 26% to 24%. Ntl and Telewest also saw reductions in the proportion of subscribers. Wanadoo, AOL and Tiscali are the main competing service providers and their market share increased over this period, as did that of other service providers. The impact of regulation on the Internet The copper pair network is owned by BT and it delivered 67% of broadband connections by the end of 2004. But regulatory actions have ensured that not all broadband services delivered using copper pair and DSL technology are supplied by BT to the consumer. Resale arrangements allow other entities to provide a ‘rebadged’ BT broadband service and sell through their own channels, so creating competition at the retail level. Local loop unbundling and shared access allow alternative network operators (alt-nets) to make use of the BT copper lines but deliver broadband service using their own DSL equipment. Collocation agreements allow the alt-net to site equipment on the BT premises (e.g. Bulldog and UKOnline). Bitstream access allows an alt-net to use BT equipment (as in resale) but to gain access to the data stream. This allows the alt-net to provide a greater degree of service differentiation than simple resale. At the core level it is thought that wholesale pricing applies to private circuits that can be used for Internet connections and that interconnection charges between networks are regulated. Dependency of Internet services on SDH As with other services, Internet services have an access component and a core component. The three main access methods (DSL, cable modem and fixed wireless access) depend in different ways on SDH. First, DSL access depends on SDH for the backhaul connection between local DSL equipment (sited at a local exchange and within a few km of the customers) and the ISP (maybe 50 miles away). In this case the DSL signals are mapped into ATM cells and then carried over private circuits using SDH links. Wireless access adopts a similar architecture except the local distribution area is defined by the range and quality of wireless coverage. Again SDH is used to carry the signals back to the ISP. 21 Cable modem architecture is slightly different as part of the backhaul connection (from the ‘optical node’ to the cable TV head end - up to 150 km from the customer) is carried over fibre in an FDM multiplex. This is for compatibility with the TV service. From the ISP looking into the Internet core, the signals are usually in an Ethernet format and again carried over an SDH/fibre connection. Within the BT network the inner core part is carried over the ‘IP over WDM’ Colossus network which uses SDH high speed interface standards so that the network can be effectively managed (but which does not use SDH add-drop multiplexing, crossconnect technologies or low-order interfaces). Corporate data Corporate data services Corporate data services are generally provided by network operators to deliver wide area connectivity between business sites, connectivity to Internet points of presence or to extend virtual private networks (VPN’s) to home workers. A large proportion of fixed telecoms network operator revenue is derived from the supply of corporate data services. Ethernet services are growing very rapidly and Web hosting too is expected to grow. Also, with very high dependence on electronic data, businesses are turning to more resilient storage area networks with their higher guarantees of reliable ‘mirror’ storage and instant switch-over in the event of network failure. This trend has grown since the 9/11 terrorist activity. The networks can be constructed from a mix of other operator services such as private circuits, dial up lines or broadband Internet access. However as more people take up broadband, other connection services such as ISDN, dial up and VPN access via private circuits are likely to fall for both office to office and home to office connections. WiFi hotspots Business users also make significant use of public Internet access ‘hotspots’. These use WiFi technology that allows users with laptops to gain access to the Internet whilst on the move. This service grew significantly in 2004, with many broadband wireless access points being provided at locations such as railway stations, airports and restaurants. Generally they are designed for ‘portable’ access to broadband (where portable devices such as laptops can be taken to a fixed location) rather than mobile where there are handover facilities between adjacent cells. The standards for WiFi are being actively developed to give higher speeds, better security and quality of service and wider deployments. Another technology, WiMax is also being developed to offer even wider bandwidths and offers the prospect of a wide range of applications and possibly becoming a competitor to fixed line broadband access systems. A mobile version of WiMax has already been standardised. 22 The impact of regulation on corporate data Perhaps the main impact of regulation on corporate data networks is that it has created an environment in which there are a number of alternative network operators able to provide private circuits. Dependence of corporate data services on SDH Corporate networks depend heavily on private circuits carried over SDH for interconnections between office sites, whether the service is based on a VPN or on conventional circuit methods. Bunched copper pairs can be used for shorter links of a few km that carry up to 8 Mb/s. However, for higher bit rates or longer connections SDH is standard practice. When VPN’s are extended to the home, dial up or broadband access is commonly used. If broadband access is used then the dependencies on SDH are the same as for the Internet. 23 Security and resilience Analysis of the key features of SDH and fibre optic technology suggests that the most likely area for exploitation in terms of an electronic attack is through the management systems. The opening up of the telecom market creates management system interconnect and interoperability issues not only between providers but also between providers and clients for the service, This is exacerbated from a security viewpoint because SDH was not originally designed to allow secure working in this way as it was designed when the state owned Telco was the norm. Given the open source constraints of this high level study, specific security issues are not detailed, however areas of potential concern are identified. These areas can be used in any follow-up discussions with the providers, as it is only the providers who can validate and comment authoritatively given the sensitivity surrounding potential vulnerabilities The management of SDH networks is based on the Telecommunications Management Network (TMN) standards (see Appendix E). However, actual implementations by different manufacturers and operators can vary significantly. The detail of the security mechanisms can also vary and in any case are kept confidential. This section therefore describes the types of security mechanism that are available for use within TMN, including prevention of security failure, detection and containment. Implementation of security policy is also considered. Finally the areas of potential concern are discussed, including possible points of attack and attack mechanisms. SDH management systems The TMN standards describe architecture from four different viewpoints, including functional, physical, information and a logical layering. The standards split the network into a series of layers, representing different types of management responsibility, starting with network elements in the physical layer. Above this is an element management layer which deals with all managed functions associated with a particular network element. A network manager takes an abstracted view of a group of element managers so that network level functions such as end to end connectivity and faults can be managed. Above this is a service management layer which handles functions associated with customer services (such as access, billing and QoS) and a business management layer which deals with policy and planning. The various parts are linked together by a Data Communications Network (DCN). Often a DCN will use private circuits for connectivity, although it is also possible that some form of VPN may be used. Information is transmitted over the DCN when modifying the network or service configuration, checking equipment status, investigating faults or downloading new software releases etc. It therefore carries a great deal of sensitive information. 24 Security management As part of the wider management framework, TMN provides the functionality to provide a degree of security [11]. The extent to which this is implemented and the detail of how it is implemented in particular manufacturer equipment and deployed systems are not openly available. However the principles and type of protection described in the standards provides a generic view of security methods. In particular, the TMN standard addresses the requirements of a security policy and considers security life cycle, including prevention, detection and containment and recovery. Prevention, detection and containment and recovery functions are incorporated as appropriate at each of the TMN layers. Prevention Prevention includes functions that restrict access to management systems and information. In particular, for electronic vulnerability it includes functions that protect management operations such as authentication, access control and data confidentiality. In addition security screening, validating that a user or customer is trustworthy, provides a prevention measure. Screening information is also likely to be held in a database. Detection Detection enables security breaches such as unauthorised access, corruption of data, customer fraud and unauthorised actions to be specifically identified so that corrective actions can be taken. Detection also includes the monitoring and analysis of alarm systems such as those protecting power, heating and ventilation or the detection of intrusion. Usage patterns can be monitored, for example by a particular customer, or traffic can be measured and analysed to identify anomalies or to collect audit trail information. Containment and recovery Containment is the group of functions that limit damage to the network, such as isolating viruses or revoking a customer’s privileges where activities are deemed to be unacceptable. Recovery enables the restoration of service and network integrity by providing data back-up. Containment and recovery actions may be initiated through an exception report arising from a detection process. Revocation lists may also be held to prevent further access to those known or suspected of being invalid due to security violations. Security policy Implementing a security policy requires the creation and dissemination of a substantial amount of sensitive information. This may include encryption keys, access control rules, access control certificates, directories, security event definitions and security audit logs. A security administration system is therefore required to manage the processes which include creating, disseminating and updating security data. This includes functions such as audit trail analysis, disaster recovery planning and security alarm analysis. 25 Resilience SDH is protected by a number of resilience mechanisms. Resilience includes both protection and restoration mechanisms. Protection automatically and rapidly switches traffic over to a reserved protection circuit in the event of a failure, while restoration involves searching for available capacity and progressively switching traffic over following failure. Premium circuits are usually protected, for example using ‘1+1’ protection which provides 1 spare circuit for every working circuit or with ring protection where the system is arranged in a ring with both working and protection circuits. In the event of a ring failure the traffic is turned around so that it follows the complementary section of the ring. In the BT network 1+1 is widely used to protect the Tier 1 network while ring protection is commonly used in the Tier 2 and Tier 3 networks. Resilience therefore depends on unused capacity in the network. Network operators must therefore ‘trade-off’ the ability to easily and quickly restore failed circuits with the extra cost of providing redundancy. Areas of potential concern Points of attack Potential points of software attack in today’s network include those from within a management centre , via the DCN or via the increasing number of interfaces between operators and service providers. Regulation has led to an increased number of operators and their need for ‘end to end’ service management increases the amount of management information that needs to be exchanged between different operators and service providers over the established interfaces. The number of interfaces and the amount of data passing over them is likely to increase as greater control over network services is delegated to customers. Good security mechanisms are available, but security depends on how tightly the security policies are managed. If the security was compromised the potential for disruption would be substantial. Risk of attack from within a management centre is minimised by careful vetting of staff, by strong authorisation and authentication procedures, including frequent password changes, and by the way responsibility for different parts of the network and different job functions are partitioned. In the future, these types of protection will need to be extended to customers as new services give them a degree of control over the network configuration. In the early stages the customers are likely to be large trusted organisations with good staffing practices but as services develop this may filter down to smaller customers where practices may be more variable. Risk of attack via the DCN could be seen as more challenging as the DCN is distributed across the whole network and points of weakness are more difficult to ascertain. Where private circuits are used to provide connections the first level of protection is that they are not publicly accessible and any access to physical equipment would require entry to an exchange 26 building, which are normally kept secure. If an intruder did gain access to an exchange building that housed SDH equipment then a ‘CRAFT’ terminal associated with a network or element manager would provide instant access to part of the SDH network. A CRAFT terminal gives full control access to all features in that particular sub-network or element. In this case access to the network manager would provide the greatest risk as it would give access to many network elements. It would be good practice for encrypted VPN’s to be used when providing remote access to management system functions and network elements but whether these are currently implemented would have to be validated with individual network and service providers. Attack mechanisms Ability to gain access to the DCN at the network manager level would allow service and network configurations to be modified, for example changing the routing of 10Gb/s circuits would immediately affect a wide range of services while suppressing alarms could conceal later failures. A forced protection switching action could route traffic to a disconnected or rerouted service. A combination of simultaneous changes could make problem identification difficult. Ability to gain access to an element manager would allow line system or cross-connect switch parameters to be changed. Maladjustment of line amplifier parameters (e.g. the pump power) could affect all wavelengths and therefore all services carried over a fibre system. 27 Conclusions and recommendations The report describes the use of ‘Wide Area Network Optic and SDH technology by UK PLC’ by setting out the UK environment in terms of Services, Providers, Technology and the Regulatory position using open source material. It was found that open source material on this subject was readily available with one of the most useful sources being Ofcom. However, as suspected, specific information on security surrounding SDH was less available but some was found in telecom standards documentation. No supplier was directly approached during the creation of this report. Although SDH has become the preferred telecom transport technology to support premium services in the UK since 1990, it is not an obsolescent technology. Since 1997 some routes have been enhanced through combination with WDM which has substantially increased fibre transmission capacity and reduced the ‘per bit’ transmission costs. More recent standards developments have led to formal definitions for WDM technologies under the title ‘Optical Transport Network’. The standards are under active development, particularly to make SDH more efficient in carrying data services such as Ethernet and in providing better operational flexibility and improved customer control. The main service types which SDH supports from an analysis of the Ofcom data are: • • • • Public voice telephony service; Internet; Mobile network services; Corporate networks. It is suggested that these four services support many of the critical national infrastructure sectors, not only the telecoms sector. Without SDH these services could not operate and therefore it is concluded that the UK critical national infrastructure is very much dependent on SDH and Wide Area Network Optic technologies. During the analysis it became clear that private circuits are used as a way of providing interconnection capacity to other operators to enable them to build their own networks and to provide their own services. In effect private circuits are an intermediate stage between the end user services and the SDH network, although they are sold as a service to other network operators. Therefore the critical national infrastructure is also dependent on private circuits. In the UK, by far the most transmission capacity is provided by BT, though changing regulation has ensured that other network operators now provide significant infrastructure, particularly within and between major towns and cities. Because of its dominance in terms of available infrastructure, it is concluded that special consideration should be given to the BT network as well as general consideration to other networks. 28 SDH was designed and developed when the emphasis on electronic security was not such an issue, because it was mainly deployed within a trusted environment such as the state owned Telco. There are, however, security features which can provide some protection. Whether these are sufficient in the new environment with interconnected multiple operators and a less trusted environment have not been studied within this report. However, SDH does offer a high degree of resilience against network failure and some security against electronic attack, but with the caveat that the security is only as good as the associated security policies and their implementation. It is concluded that there are potential opportunities for compromise if an attacker were to gain access to the data communications network or to the management system. Unauthorised access to network or element managers could lead to major service disruption. But providing that security policies are carefully implemented the disruption could be contained. Unauthorised access to the higher level management systems could allow billing or service levels to be compromised. This conclusion is not based on a vulnerability analysis of specific service offerings but on the technology and management systems in general. Due to the open source nature of this report, not all aspects could be studied. Therefore the following recommendations are made for future investigation if thought necessary: 1. The current standard security features available within SDH and Wide Area Network Optic technologies could be studied to see if they are complete and effective in the new environment where you have interconnected multiple operators and clients; 2. Suppliers could be approached to understand how the security features of the technology are deployed and how effective they are against an electronic attack; 3. The BT networks could be studied in more depth, given that they are the dominant supplier and likely to lead the way on standards and potential improvements in security; 4. An analysis could be made of the effectiveness of the security in relation to each of the major service offerings to see if one was less secure than another and therefore to judge best practice; 5. Dependent on the results of the previous points, a good practice guide could be produced outlining how best to secure SDH and Wide Area Network Optic technologies. 29 Appendix A: Ofcom telecommunications report 2005 This appendix examines the key markets as described in the Ofcom report ‘Communications Market 2005 – Telecommunications’. The Ofcom report has taken perhaps the most comprehensive recent and authoritative analysis of the various markets that is openly available. It identifies key themes that take account of industry structure and competition which provide a broad view of the telecommunications market up to 2005, with emphasis on developments in 2004. It then looks at trends in telecommunications services from both industry and user perspectives and the impact that competition has had on the services. In this Appendix the charts, and messages from the charts, are the same as in the Ofcom report. However the information has been reorganised on the basis of the four major services provided so that the market information can be more clearly seen in the context of the CNI. The first section discusses the overall size of the telecoms market and subsequent sections examine the individual market sectors, including fixed voice, mobile, Internet and corporate data. Size of the telecoms market Key players Figure 6 gives a summary of the main telecoms market players Figure 6 UK telecoms market players (NB Energis has been bought by C&W) 30 Turnover and value added Ofcom estimated that the size of the UK telecoms sector in relevant turnover terms was £44.6bn in 2004. This Figure 7 Turnover of UK wholesale and retail telecom markets The value added by the UK telecoms sector to GDP was measured as £25.5bn in 2003 and estimated as £26.7bn in 2004, or 2.8% of GDP. Figure 8 Value added by UK telecoms industry BT was the biggest player in the industry by far, but its share of the market has fallen to 41%, lower than that of most other incumbent operators in other countries. This reflects the degree of competition in the UK and also the fact that BT does not have a mobile network business. 31 Figure 9 Share of telecom industry revenues Another way of viewing the telecom market share is by examining the number of connections (of all kinds) provided by each of the network operators. This also illustrates the degree of competition in the market. Share of market connections Figure 10 Share of UK telecom connections 32 Service revenues During 2004 the total revenues from mobile voice and data exceeded the revenues from fixed calls and access for the first time. This applied to both residential and business customers. Figure 11 UK telecoms industry retail revenues Examination of the changes from 2003 to 2004 shows that mobile is the biggest single driver for growth. Ofcom also estimated that businesses accounted for almost a half of all end user spending on the main telecom services in 2004, amounting to over £14bn. Figure 12 Business spending on telecom services. 33 Fixed line voice Call volumes Overall Ofcom reports that fixed voice traffic declined slightly in 2004, partly due to mobile call substitution, but also because of other forms of substitution. However, regulatory intervention to facilitate carrier pre-selection (CPS) call services and, more recently, the provision of a wholesale line rental product from BT, has assisted a number of recent entrants to achieve strong growth in terms of both customers and revenues. This competition led to innovative tariff changes such as increased line rental in exchange for lower average call prices, or simply a flat rate charge per month. Voice over IP, the technology that allows voice calls to be carried over the Internet is also likely to be having an effect although at this stage Ofcom have not gathered data to analyse this. VOIP is expected to become a preferred mechanism for voice calls in a future converged environment. The Skype service in particular claims to be handling huge volumes of calls worldwide and this is becoming popular for both business and residential calls. Figure 13 Fixed and mobile voice traffic volumes There was also a reduction in both call volumes and in the total PSTN exchange lines in the same period. Ofcom attributs this partly to mobile substituting voice calls and partly to broadband substituting both ISDN connections and second lines for Internet access. This effect was noticeable particularly in ‘high end’ users. 34 Figure 14 Fixed telecom lines Figure 15 Fixed telecom call volumes Revenues The result of the reductions in fixed lines and call volumes was a reduction in total revenues for the fixed voice network. However a more important factor in the reduced revenues was the effect of stiff price competition, the introduction of new tariff schemes and the willingness of consumers to switch to a cheaper provider. Figure 16 Average UK fixed telecoms call revenues 35 Figure 17 Fixed line voice telecoms revenues Fixed line usage In spite of some substitution of mobile the average use per residential fixed line has been fairly constant in recent years. Figure 18 Average use per residential fixed line In addition to substitution by mobile, voice calls are sometime substituted by SMS messaging or by e-mail. The following responses indicate this effect. Figure 19 Reasons for replacing fixed voice with messaging 36 Figure 20 Reasons for replacing fixed voice with e-mail Business use Voice calls for business have been falling in recent years and it is likely that e-mail and other forms of electronic communication (such as VOIP) have led to this change. Figure 21 Average use per business fixed line Carrier pre-select services (Indirect Access – IA) appear also to have taken increased market share in businesses while BT’s market share has reduced. Ofcom reports that BT remains the dominant supplier to SME’s, with 86% using BT services for some or all of their requirements. Figure 22 Market share of business call volumes 37 Fixed and mobile Although fixed voice call volumes have been falling and mobile calls growing, there seems no likelihood in the near future that mobile will replace the fixed line market. The number of household with mobile phone only is 9% and those with fixed line only is 10%, with the majority of households with both fixed and mobile. This indicates that mobile complements fixed, rather than substituting it, although there may be a small element of substitution. Figure 23 Household penetration of fixed and mobile telephony The levels of fixed line ownership are fairly similar across the UK. Figure 24 Household penetration of fixed/mobile telephony among the nations Around 20% of consumers said they use mobile as their main way of making calls and Ofcom research showed that around 42% of all consumers used their mobile phone in preference to a fixed line citing cost, convenience and availability as the main reasons. Figure 25 Main method of making and receiving calls among UK adults 38 VOIP VOIP technology allows users to make voice calls over data networks and particularly the Internet. Calls can be made directly between users over the Internet, or between the Internet and the PSTN, within the PSTN or within corporate networks. Voice over IP is perhaps a greater threat to the conventional circuit switched PSTN thann mobile and seems likely to force all voice network operating companies to rethink their pricing and investment strategies and particularly BT, cable and mobile operators. BT is now well advanced in its network plans to replace the PSTN with its 21st Century Network which will carry voice using the IP protocols. VOIP has seen an increase in take up with some large UK corporates moving to a VOIP platform. All large businesses have high bandwidth IP connections so the benefit for them is free call between corporate sites. For residential users the benefits are less immediate as both caller and called parties must have a broadband connection and both must download the same software. Skype is proving very popular, particularly because of its ease of use, and also because of free or cheap international calling. Skype claims to have downloaded 250m copies of its free software. Vonage have also launched a VOIP service in the UK using an adapter that sits between a customer’s normal telephone and their broadband connection. Following this, BT launched its own VOIP service to broadband customers and also an SME service called BT Business Broadband Voice. These developments are likely to have significant impact in the future on voice calls. Mobile Call volumes Call volumes for mobile were discussed in the Fixed Line Voice section. Revenues Mobile revenues are close to those generated by fixed calls (see also Figure xxx in fixed call revenues section). There has been a trend to bundle services together within the monthly fee, particularly SMS messaging with voice. When SMS revenues are also included the mobile total exceeds fixed voice revenues. Overall mobile retail revenues were £12.3bn in 2004. However data revenues other than SMS remain very low. Figure 26 Mobile retail revenues 39 Most of the increased revenues are attributed to growth in customer numbers. However the market is now reaching saturation and it seems likely that mobile operators will strive to encourage use of new data services. Regulatory controls on the prices mobile operators can charge for interconnection with other networks have brought prices down and affected revenues. Mobile usage At the end of 2004 the five mobile network operators reported that there were 61.4m mobile users in the UK, more than one per head of population. This may be accounted for in part by users holding more than one type of device (for example a mobile phone and a ‘blackberry’ email device). It is also possible that not all of these users are active. Figure 27 Mobile active customers The 4 main mobile operators have retained a fairly equal share of the customer base, while 3UK have grown their customer base, and has become a significant player. 40 Figure 28 Active mobile customers by network operator Revenues by the main operators remain in relative proportion to the size of the customer base. Vodaphone does particularly well in part because it dominates the top end corporate market. Figure 29 Estimated retail revenues by network operator SMS messaging has also grown in recent years although the growth appeared flat in 2004. The chart below shows messages per customer, so the figures for 2004 may be slightly suppressed because some users have more than one device. Ofcom research in 2004 showed that over 40% of consumers claimed to send a mobile text message instead of making a fixed voice call, generally because it was perceived to be cheaper and more convenient than making a call with their fixed phone. 41 Figure 30 Average SMS and MMS messages sent per active mobile customer The use of WAP (for Internet access) and MMS (for picture transmission) services remains low. Business use The penetration of mobiles among small businesses is low compared to that for residential use, with less than 60% claiming to own a mobile phone. Small businesses place greater importance on access to data. Figure 31 Penetration of mobile telephony among SMEs Internet Access to Internet services can be via several methods. Narrowband access via the PSTN has been discussed already in the section on voice networks. Access via leased lines and ISDN are possible but is at a low level and declining. The main other method to be examined is broadband access. Broadband access has grown rapidly in recent years and has now become a mass market consumer product, with more than 7.5m broadband connections in May 2005. 42 Figure 32 Broadband penetration in the UK The reasons for this growth has been driven by two major factors: BT’s deployment of DSL systems to make broadband available to 99.6% of the population by December 2005 and by falling prices. Figure 33 Average UK residential subscription prices from broadband Consumers with access to ADSL are able to choose from more than 20 broadband ISP’s (including BT, Tiscali, Wanadoo, Blueyonder (Telewest) and AOL). If they live in a cable area they can also opt to take service from either Telewest or ntl. Access speeds have also risen in the past two years. Previously 512kb/s was the norm, but now 1Mb/s has become the norm with 2Mb/s generally available as a premium service and 512kb/s as a discount option. This increase of speed seems set to continue and companies such as Bulldog and UK Online offer 4Mb/s and 8Mb/s. As next generation technology is introduced speeds of around 20Mb/s should be possible. The majority of these connections are supplied via BT’s copper pairs and DSL technology. However not all are supplied entirely by BT. A high proportion is provided through ‘resale’ arrangements in which BT provides the equipment and maintains the network under a wholesale arrangement, but the services are sold by the resale provider. A smaller proportion are sold through local loop unbundling arrangements in which the alternative network provider provides the DSL equipment and the local connection is diverted to this equipment, rather than to the BT equipment. 43 Broadband is now widely available across the UK. Figure 34 Broadband availability across the UK As the broadband service availability has increased and the price differential between narrowband and broadband decreased, customers who previously used dial up or unmetered access are migrating to broadband. This is leading to increased revenues from broadband services. Figure 35 UK Internet connections 44 Figure 36 Internet and broadband provision service revenues Broadband access competition can be either at the facilities or infrastructure level, or it can be at the services level. Three main players provide infrastructure: BT, ntl and Telewest. In addition, some infrastructure is also provided by via fixed wireless access, satellite and local loop unbundling (LLU). With LLU alternative network operators are able to lease copper pairs from BT and to install their equipment in the local exchanges. Limited deployment of cable infrastructure and low take up of LLU meant that BT wholesale products provided 67% of broadband connections at the end of 2004. Figure 37 Broadband connections Although the number of broadband customers served by BT virtually trebled in 2004, BT’s proportion of subscribers fell slightly from 26% to 24%. Ntl and Telewest also saw reductions in the proportion of subscribers. Wanadoo, AOL and Tiscali are the main competing service providers and their market share increased over this period, as did that of other service providers. 45 Figure 38 UK broadband service provision: share of subscribers Ofcom reported that, by the end of 2004, 55% of UK homes had an Internet connection and 63% had a PC, though there was some variation across the UK with Wales being significantly lower on Internet connections. Figure 39 Internet and PC penetration in UK homes In addition to home use, Ofcom reports that around a quarter of all UK adults use the Internet at work and others use them at Internet cafes and libraries. A significant proportion claim they have no need for an Internet connection and gave the following reasons. Figure 40 Reasons for not having the Internet at home 46 Ofcom research indicated that broadband users say they spend more time on the Internet (18 hours) than narrowband users who claimed to spend around 8 hours. Also broadband users are more likely to use more advanced features. In particular, broadband users download more music and videos, use messaging services more and purchase more on line. Figure 41 Online applications used by broadband and narrowband users. Corporate data A large proportion of fixed telecoms network operator revenue is derived from the supply of corporate data services. Business data services are generally provided by network operators to deliver wide area connectivity between business sites, or to extend virtual private networks (VPNs) to home workers. Services can be integrated with more well-known services such as leased line and dial up or broadband Internet access. Historical data was not available to Ofcom and so a forecast was prepared instead. The forecast indicates that leased lines are expected to give way to VPNs. As VPNs are extended to home workers, the recently established widespread availability of broadband services can also be seen as an important factor. Ethernet services are growing very rapidly and Web hosting is also expected to grow. Figure 42 Corporate data service revenues 47 Increasing numbers of SME’s are taking up broadband Internet access while the numbers of ISDN lines and dial up connections are reducing. Figure 43 SME Internet access by connection method Business users also make significant use of public Internet access ‘hotspots’. These use WiFi technology that allows users with laptops to gain access to the Internet whilst on the move. This service grew significantly in 2004, with many broadband wireless access points being provided at locations such as railway stations, airports and restaurants. Generally they are designed for ‘portable’ access to broadband (where portable devices such as laptops can be taken to a fixed location) rather than mobile where there are handover facilities between adjacent cells. Roaming agreements allow customers of one operator to make use of networks belonging to another. Thus many more hotspots are advertised than there are physical locations. Nonetheless there were around 8000 hotspots available across the UK by the end of 2004 with more than 20 operators offering service. However even this coverage is small compared to mobile coverage. The standards for WiFi are being actively developed to give higher speeds, better security and quality of service and wider deployments. Another technology, WiMax is also being developed to offer even wider bandwidths and offers the prospect of a wide range of applications and possibly becoming a competitor to fixed line broadband access systems. A mobile version of WiMax has already been standardised. 48 Appendix B: Service providers, carrier operators and equipment providers Details of mobile operators Company Contact Location Ownership Size Company Contact Location Ownership Size Company Contact Location Ownership Size Vodafone UK Vodafone Group plc, The Courtyard, 2-4 London Road, Newbury, Berkshire RG14 1JX Tel: +44(0) 1635 33251 Newbury, UK Vodafone Group plc 5000+ O2 O2 Ltd Wellington Street Slough Berkshire SL1 1YP Tel: +44(0)113 272 2000 Web: www.o2.com Slough, UK Telefonica, Spain 5000+ Orange UK Orange plc, The Chase John Tate Road Foxholes Business Park Hertford SG13 7NN Hertford, UK France Telecom 5000+ 49 Company Contact Location Ownership Size Company Contact Location Ownership Size T Mobile T-Mobile - Head Office Comet Way Hatfield Business Park, Hatfield, AL10 9BW Tel: + not available Hatfield, UK Deutsche Telekom AG 5000+ 3UK 3G UK Ltd Star House 20 Grenfell Road Maidenhead SL6 1EH Tel: 0870 7330333 Hatfield, UK Hutchison 3G UK Limited 5000+ Details of carrier operators Company Contact BT plc BT Centre 81 Newgate Street London EC1A 7AJ Tel: 0207 356 5000 Location Ownership Size London, UK BT Group 50000+ Company Contact Cable and Wireless plc Cable & Wireless plc. 124 Theobalds Road, London, WC1X 8RX Tel: 020 7315 4000 Location Ownership Size London, UK C&W 10000+ 50 Company Contact ntl ntl House Bartley Wood Business Park Bartley Way Hook Hampshire RG27 9UP Tel: 01256 75 1045 Location Ownership Size Hook, UK ntl Group Ltd 2000+ Company Contact Telewest Currently merging with ntl Location Ownership Size London, UK ntl 1000+ Company Contact Global Crossing Chineham Gate Crockford Lane Chineham Business Park Basingstoke, Hants U.K. RG24 8NA Tel: 0 845 000 1000 Location Ownership Size Basingstoke Global Crossing, USA 5000+? Company COLT Telecom Group plc Contact Location Ownership Size Beaufort House 15 St Botolph Street London EC3A 7QN Tel: +44 (0)20 7390 3900 Fax: +44 (0) 20 7390 3901 [email protected] London Colt 5000+? 51 Company Contact Location Ownership Size SURF Telecoms Western Power Distribution Venture Way Priors Wood Industrial Estate Taunton Somerset TA2 8DG Telephone: 01823 348 710 Fax: 01823 348 688 London Western Power Distribution 1000+? Details of equipment suppliers Company Contact Alcatel Alcatel IP Networks 7a The Long Room Coppermill Lock Canal Side Harefield UB9 6JA Tel: 0870903 3600 Location Ownership Size Paris, France Alcatel 58000 Company Contact Lucent Technologies Lucent Technologies 600 Mountain Ave. Murray Hill, NJ 07974-0636 Tel: +1 908 582-3000 New Jersey, USA Lucent 30000 + Location Ownership Size 52 Company Contact Location Ownership Size Fujitsu Fujitsu Telecommunications Europe Ltd Solihull Parkway Birmingham Business Park Birmingham B37 7YU Tel: +44 (0) 121 717 6000 Fax: +44 (0) 121 717 6161 www.fujitsu.com/uk/services/telecom [email protected] Birmingham Fujitsu, Japan 100000 + Details of fibre cable manufacturers Company Contact Location Ownership Size Pirelli (now Prysmian Cables & Systems) Cannot find details in time available Company Contact Function Location Ownership Size BICC Cannot find details in time available Company Contact Corning optical fibres Second Avenue Deeside Industrial Park Deeside Flintshire CH5 2NX Tel: 01244 281281 UK n/a 1000 + Location Ownership Size 53 Appendix C: BT 21st century network The main network development activity currently underway in the UK is the BT 21st Century Network (21CN). This is a radical and comprehensive replacement of BT’s 22 different networks and some 2000 operational support systems. The networks include the PSTN (from the core out to concentrator level), leased line, WDM, SDH, PDH, KiloStream, MegaStream, data and other service networks. From the concentrator level out to the customer will remain mainly analogue. The published target is to switch off these networks, including the circuit switched PSTN by 2008. The challenge is to keep the services fully running while this takes place. During the transition period extensive interworking between old and new networks and between old and new OSS will be essential if service disruption is to be avoided. The timescales are therefore short because operating two parallel networks will be very costly. While other administrations have offered VoIP services or carried out partial replacement of circuit switched technology with IP based technology, BT is the first to attempt to carry out a comprehensive core/metropolitan network replacement. Estimated to cost £2 billion per annum up to the end of the decade the objectives are ambitious. They are (i) to improve the customer experience and provide them with a much increased level of choice and control, (ii) to provide a single converged platform able to efficiently deliver new services and (iii) to reduce operational costs by about £1 billion per year from 2008/9. The stated target is to achieve a 40% reduction in whole life costs of the network. The initiative recognises the many types of convergence taking place today, including hardware and software, voice and data, fixed and mobile etc. and the aim is to provide a network platform able to support all types of convergence. Logical Nodes ~80,000 PCPs in the Access Network Today ~100,000 Remote Concs, DLAMS & Data Muxes ~1000 + Voice Switches and Data Cross Connects ~170 Core Switches (DMSU / NGS) Data Centre International Networks Internet Peering End Customer Logical Nodes Future Begin Fibre to the PCP ~30,000 MultiService Access Devices ~100 Metro Routers ~10 Core Routers Aggregation Service Edge Core Data Centre Figure 44 Migration of BT network to 21CN. Source: BT presentation by Paul Reynolds 54 21CN is built around a common core IP platform that has the capability to support both data and real time services: it will offer capability to support the highest speeds and they plan an unprecedented open and transparent approach. It will be controlled by an intelligence layer that is mobile enabled and based on 3GPP concepts (c.f. mobile without the handover). OSS is based on commercial off-the-shelf equipment in a hub architecture. It will use a work manager approach that allows new services and applications to be built in an open way on a common core in the hub. Policy control mechanisms will ensure security and privacy. ATM and Frame Relay will be replaced by IP/VPN’s, the PSTN by VoIP and video services will be added. Services will be converged to Ethernet /IP over fibre and DSL. It will be possible to connect any device from anywhere, including a Bluephone service that allows a standard mobile phone to connect either to an access point on a fixed network in the home or office or to a GSM network in a seamless way. 55 Appendix D: Evolution of SDH Synchronous Digital Hierarchy (SDH) and Synchronous Optical Network (SONET) are two families of closely related standards that govern parameters for high speed transmission. SDH, with a basic rate near 155 Mb/s, is used principally in Europe and Asia and commonly handles tributary channels at multiples of 2Mb/s while SONET, with a basic rate near 52 Mb/s is used principally in N America and was designed to handle 1.5 Mb/s granularity tributary channels. 1.5 Mb/s signals can be mapped into SDH containers and 2 Mb/s signals can be mapped into SONET. Higher speed signals map into the SDH bit rates of 155Mb/s and above. SONET and SDH are both able to carry TDM and packet traffic. All transport resources in an SDH system are allocated on a TDM channel basis. Any aggregation of packet traffic is left to the client layer services network while the SDH network focuses on its task of transporting signals reliably between end points. This keeps SDH network design simple but it has the deficiency that it does not allow differentiation between lucrative high-end services and best-effort low-end services: all data is treated equally. Main elements of SDH systems The main elements of SDH are optical line systems (consisting of optical transmitters, regenerators and optical receivers), add-drop multiplexers and cross-connect switches. First generation SDH consisted of the line systems and a single-stage multiplexer/demultiplexer that aggregated various lower-rate inputs (e.g. 2Mb/s and n x 2 Mb/s) into a high-speed line signal (e.g. 155Mb/s). At an add/drop site, only those signals that need to be accessed are dropped or inserted, with the remaining traffic continuing through the network element without requiring special processing. The ADM’s could be configured either as a linear system or, more commonly, as a resilient ring such as in a Bidirectional Line Switched Ring (BLSR). Second generation SDH introduced cross-connect elements, which enabled carriers to perform TDM channel switching at the edge of the SDH network, allowing further automation of service provision or service change processes. In addition, Ethernet interfaces were added to enable simple and transparent mapping of Ethernet traffic to SDH/SONET circuits. These enhancements and traffic multiplexing options have been advantageous while the network still predominantly carries synchronous voice traffic, but has also to carry some data traffic. Enhancements to SDH through the use of WDM and optical amplifiers have enabled SDH systems to reach across much greater distances and with far higher capacities. Strictly speaking, WDM and optical amplifiers are standardised under the name Optical Transport Network (OTN), rather than SDH. Typically the WDM and amplifier components are integrated into the same equipment as SDH for economic reasons. WDM equipment is available that allows individual wavelengths to be added or dropped at a node in the same way that SDH allows a 2 Mb/s or 155Mb/s channel to be added or dropped. 56 Next Generation SDH/SONET technologies Since the late 1990’s standards bodies have defined and developed a new optical layer able to support multiple protocols and recently a new transport hierarchy has been introduced, known as the Optical Transport Hierarchy (OTH). This is in effect an extension of the SDH standards for the Optical Transport Network (OTN). OTN has been developed for core network applications and is analogous to the SDH standards, but with enhancements. In particular OTH allows multiplexing to be extended into the optical domain and uses a new frame structure known as a digital wrapper, which provides transparent transport of SDH and other client payloads (such as Ethernet) across the optical domain with full carrier class management functionality. OTN provides consolidated data transport, allowing SDH, Ethernet and other packet formats to be efficiently mapped into optical data units which can be routed across a network under the control of MPLS switching (Multi Protocol Label Switching), rather than TDM switching. The first equipment products based on OTN are now available from leading manufacturers though the standardization process is not yet complete and interoperability testing is ongoing. A key feature of data networks has been the ability of a service to request capacity from a lower network layer when it is needed, packet by packet. When the capacity is not needed by that service it is available to be used by other services and users. (For example the Media Access Control layer in an Ethernet must handle these requests and resolve contention when two users both want the same channel at the same time). No equivalent mechanism existed in earlier SDH systems as the process of setting up a circuit connection in an SDH network up to now has been carried out via a network manager and involves manual steps. Given the increased volumes of data and the need to utilise capacity efficiently, data services need to be able to request capacity from the underlying physical layer as and when it is needed. Improvements to the basic SDH standards have therefore been recently developed in the following ways. 1. A variety of formats and rates are used by data networks that up to now have been awkward to map into SDH. A Generic Framing Procedure (‘digital wrapper’) has been developed to allow a wide range of packet formats to be readily adapted to SDH containers. 2. Multi Protocol Label Switching has being adapted for application to SDH networks in a general form (called GMPLS). This allows improved end-to-end management and control of a transport network through supporting the dynamic provisioning of resources. 3. In practice, SDH network planning leads to ‘stranded capacity’ where capacity on a link is unused, but cannot be used by a new connection because available bit rates in adjacent links don’t match. Virtual concatenation (VCAT) allows this stranded capacity to be utilised. It also allows the transmission capacity to be more accurately matched to the capacity needed by the data network. 57 4. Adjustment of the transmission capacity needs to be done dynamically to get best efficiency from virtual concatenation. The Link Capacity Adjustment Scheme (LCAS) provides the signalling protocol to allow this to happen allowing hitless in-service addition and removal of STM containers to or from a virtual concatenation group. 5. Conventional SDH ring architectures provide (circa) 50 ms protection switching in network failure scenarios but in most cases but the capacity to provide this protection is largely wasted. Resilient Packet Ring (RPR) is a packet based transport technology that adopts statistical multiplexing to better utilize all available bandwidth, including protection bandwidth. The fibre ring is still able to provide 50 ms protection switching for high network availability. These techniques are described more fully below. Generic Framing Procedure (GFP) Ref: ITU-T Recommendation G.7041, ANSI T1.105 Generic Framing Protocol is designed to adapt a variety of character and packet oriented payloads into SDH so they can be mapped into SDH containers. This will allow SDH to readily carry data and storage protocols such as Ethernet, Fibre Channel and ESCON. GFP has wide industry support and interoperability tests are under way. Generalized Multiprotocol Label Switching (GMPLS) Ref: Internet Engineering Task Force (IETF) draft-ietf-ccamp-gmpls-sonet-sdh-08.txt and draft-ietf-ccamp-gmpls-architecture-07.txt. GMPLS is a family of protocols under development by the IETF designed to extend MPLS to encompass SDH channels, wavelengths and even whole fibres. The attraction of GMPLS is its ability to improve end-to-end management and control of a transport network through supporting the dynamic provisioning of resources. NB MPLS is a framework specified by the IETF to enable efficient designation, routing, forwarding, and switching of traffic flows through a network. It specifies mechanisms to manage traffic flows of various granularities between different hardware, machines or applications and provides a means to map IP addresses to simple, fixed-length labels used by different packet-forwarding and packet-switching methods. MPLS interfaces to existing routing protocols such as resource reservation protocol (RSVP) and open shortest path first (OSPF). It supports the IP, ATM, and frame-relay Layer-2 protocols but remains independent of them. Virtual Concatenation ITU-T Recommendation G.707 and G.783, ANSI T1.105 Virtual Concatenation (VCAT) aggregates fragmented virtual containers between two end points to form a higher capacity virtual channel. The virtual containers do not have to be contiguous within the SDH frame and do not even have to follow the same route to the common destination. 58 In a traditional SDH connection, Gigabit Ethernet, mapped over SDH, would occupy an entire STM-16 (2.5 Gb/s) channel, leaving 1.5 Gb/s unused. Similarly a 10 Mb/s Ethernet would be carried in a 51 Mb/s VC-3, meaning 41 Mbps would be unused. VCAT allows channel capacity to be built as needed from selected combinations of tributaries. These tributaries can be logically combined, with the individual tributaries being routed independently across the network. VCAT can be viewed as an inverse multiplexing scheme in which a number of virtual containers are bound together to form a virtual concatenated group. Thus a single GbE service channel could be supported by say 8 separate VC4 channels in the SDH network. A crucial property of VCAT is that it does not place any new requirements on the existing SDH network since the containers that make up the group travel independently from the source over the SDH network to their common destination. Hence it is sufficient to support VCAT only in both termination points. This allows a smooth upgrade path, since VCAT equipment needs only to be provided at the endpoints to establish the connection. The rest of the network remains unchanged. Trail trace and parity checks are made on the group as a whole. Link Capacity Adjustment Scheme ITU-T G.7042/T1.105 LCAS provides the signalling control mechanism for the VCAT groups, giving the carrier dynamic bandwidth and protection management. LCAS allows hitless in-service addition and removal of STM containers to or from a virtual concatenation group. Capacity can be dynamically adjusted to match the service need, restore failed circuits or adjust capacity during failure. For example a 1 GbE signal may only require 100 Mb/s of bandwidth on day 1, and so only one VC-4 is needed across the SDH network. Later as the traffic grows additional VC-4s can be connected up to the maximum bandwidth of the GbE interface. Commands to provide, remove or change the service may come from the Network Manager or Automatic Switched Transport Network (ASTN) control and may be triggered by customer demand, protection or restoration plans. The scheme allows temporary removal of failed VC members, allows automatic decrease of capacity during network failures and automatic increase after recovery. This feature can be used to plan a service that can tolerate a defined minimum bandwidth during failure conditions, but under normal conditions has a higher bandwidth allocation. Additionally, the LCAS protocol provides load sharing protection by dynamically removing failed members from the group when there are faults. This temporarily reduces the bandwidth of the end-to-end service, but the applications that use the channel are usually capable of adapting to such varying bandwidths. This functionality allows a provider to significantly improve the resilience offered to end users by provisioning diversely routed SDH paths that belong to the same group. The combination of VCAT and LCAS is a very powerful addition to the SDH standard as it solves the bandwidth granularity problem and harnesses stranded capacity without requiring huge changes to existing equipment. 59 Resilient Packet Rings IEEE specification 802.17 Resilient Packet Ring (RPR) is a transport technology that has been available for several years and is now being deployed to support IP based multimedia services. Conventional SDH ring architectures provide 50 ms protection switching in network failure scenarios but in most cases but the capacity to provide this protection is largely wasted. Also, because SDH is channelized, no statistical multiplexing gain can be achieved between channels, leading to network inefficiencies because unused bandwidth on one channel cannot be utilized by another. Resilient Packet Ring (RPR) is a packet based transport technology that adopts statistical multiplexing to better utilize all available bandwidth, including protection bandwidth. The fibre ring is still able to provide 50 ms protection switching for high network availability. RPR also provides several levels of Quality of Service (QoS) guarantees, including QoS sufficient to support any type of TDM service transported over packets. 60 Appendix E: Element and network management ITU-T Recommendation M.3010, Principles for a Telecommunication Management Network. Management and control features of SDH SDH networks are made up of a set of network elements. Basic elements include • • • • Point to point systems (including interface cards, multiplexers, protection switching mechanisms, transponders, optical amplifiers and regenerators etc.) Add-drop multiplexers Cross-connect switches Ring systems Each element is managed by an element manager which holds a complete data representation of the components in the element, including what is in the element, how it is configured, and status etc.). Normally there will be a craft terminal associated with the element which provides facilities for configuring and interrogating each component within the element. A LAN operates within the element to provide data communications within the element. Each element manager in a network is connected to a network manager via a Data Communications Network (DCN). The network manager is able to look across abstracted data from all element managers within its domain to manage end to end processes such as provisioning and maintenance and to ascertain root causes of faults. The network manager in turn is linked to a Network Operations Unit (NOU) which allows personnel to intervene in network operations. Behind the NOU there are generally a series of Operational Support Systems (OSS) that provide the tools for operational functions such as plan and build, assign and configure service and maintain and restore. These also include other essential data such as information about the cables and fibres in the network. Usually the operational support systems and network manager (at least in early systems) have been provided by the network operator. 61 The following diagram illustrates the typical management architecture and identifies the main elements: Operational support systems (all technologies) Plan & build Assign & configure service Maintain & restore Network inventory Datacomms network Standard interfaces Element manager Element manager Element manager Software to map TMN to OSS Network elements & managers are technology specific Figure 45 SDH management architecture Element managers Element managers provide local software resources to manage all aspects of an individual element such as a line system, add-drop multiplexer or cross-connect switch. They contain a detailed data representation of all aspects of the element, including what cards and versions are in the element, how the components are connected and what their status is. Usually they are associated with a local workstation that is used for commissioning purposes and may be used later by maintenance personnel. The functions of the element manager are: • • • • • • Event & alarm management Configuration management Communications facilities Performance management Access & security Local control and testing facilities 62 The element managers are normally provided by the equipment manufacturer and links between elements and element managers are made via an equipment LAN, according to the design of the particular manufacturer. The types of information carried between an element manager and the equipment is illustrated in the following diagram: WS retrieve inventory wavelength summary, channel power alarm information attributes logical view, equipment view performance events set EM switch state thresholds configuration NE Id inhibit alarm reporting enable/disable APSD notifications NE alarms protection switching events threshold crossing alerts Figure 46 Information carried between element manager and element The element manager can also be accessed from a remote workstation at a network management centre, where changes to equipment configuration can be made, the status of the element monitored or administrative data collected. The network management centre personnel can generally interrogate or change parameters associated with many network elements from the workstation, but the element manager itself is defined as managing only a single element. Network managers Network managers provide software resources to manage network level entities and contain network level information, such as the path taken by a particular circuit and information abstracted from element managers. They oversee a number of element managers and allow functions such as management of end to end connections or root cause analyses of faults to be carried out. The links between element managers and network managers and workstations are made through a data communications network (DCN). Multiplex section overheads in the SDH frame provide a connection for the DCN and supports OA&M functions. Control bytes in the section overheads also make provision for a range of automatic protection mechanisms in both point to point and ring configurations. Protection can act at channel (155Mb/s), multiplex section (n x 155 Mb/s) or system level (line rate). A switchover time of 50ms is commonly quoted for SDH protection mechanisms, but this refers to specific network test conditions and in practice the figure can vary. 63 Data communications network The DCN can be carried either over a separate network, such as leased lines, or can be carried over capacity provided in the SDH frame. Three types of management channels can be carried over the SDH frame, as illustrated below. NMS (Network Management System) EMS (Element Management System) EMS Node Node EMS Node Regen EMS Node EMS Control plane channels Orderwire provides 64kb/s telephony Telemetry provides communications between node & line site for remote management of line equipment Fault management channel provides high priority comms between nodes, for initiating network restoration following network failure. Passes transparently through line sites General network management provides high capacity, medium priority channel between NMS & EMS, for managing nodes and downloading software Figure 47 DCN channels carried within the SDH frame. An ‘order wire’ provides a 64kb/s telephony channel and telemetry services between node and line sites for remote management of line equipment. This is able to monitor environmental factors such as temperature or physical alarms. A fault management channel provides high priority communications between nodes and is used to initiate network restoration following a failure. This channel passes transparently through the line sites. A general network management channel provides a high capacity, medium priority channel between NMS & EMS, and is used for managing nodes and downloading software upgrades. These channels can all be carried in the system overheads and, if carried in this way are only accessible to the operator. 64 Appendix F: Regulatory position Background In 1984 the Government embarked on a policy to introduce competition into UK telecommunications. BT was privatised and Oftel was set up to ensure fair competition and pricing. The policy has progressively resulted in new alternative network providers (‘alt-nets’) entering the market such as Cable and Wireless (including Energis), Colt and Surf telecom. This also opened the way for cable TV providers (ntl and Telewest) to provide telecom services over their fibre networks. During the 1990s the European Union assumed an increasing role in telecoms, working towards a single European telecoms market. In 2000 it issued 5 new directives and one regulation to cover converging telecoms, radiocoms and broadcasting markets. The European objectives are to promote competition in the industry, stimulate the internal market and ensure the interests of citizens/consumers are served. Current legislation To comply with this the UK regulatory system was radically reformed in 2003 and a new regulator, Ofcom, was set up with responsibility for telecoms, radiocoms and broadcasting. Regulation moved away from a licensed based system to one in which there is a general entitlement to operate providing certain rules are met. Special rules apply to providers who hold 'Significant Market Power' and for 'Universal Service Obligations' to be met. The breadth of the regulation is very broad and not all parts can be applied to the special field of fibre optic and SDH infrastructure. However the Access Directive deals with relationships between operators and undertakings regarding access to network facilities and to interconnection between networks. The content of the Authorisation Directive is to implement an internal market in electronic communications networks and services through the harmonisation and simplification of authorisation rules. The Processing Personal Data directive addresses in particular the right to privacy and the processing of personal data. It is designed to ensure the free movement of such data and of telecommunications equipment and services in the Community. Impact on the carriers A key effect of regulation on the fibre optic and SDH markets has been through price controls on ‘Significant Market Players’ and the provision of wholesale and retail services. These have helped to ensure fair competition and to establish multiple providers of operator services. This has been further helped through the framework directive which has ensured the establishment of consultation processes on new regulatory proposals and of an appeals procedure. There 65 has also been a major impact on the way BT is organised and managed to ensure transparency and equal access. This has been evident in the recent formation of Openreach which will provide an installation and maintenance service to all service providers on an equal basis and at the same price. Its products will include Local Loop Unbundling, Wholesale Line Rental and Backhaul products. Future regulatory scenarios Regulation is currently under review in the UK and in Europe and guidance will no doubt change. A possible output of this report could be to identify areas where specific provisions should be made in future regulation to ensure security of network related information and communications networks in the future. Currently the Universal Service Directive deals with basic public services and circumstances in which the needs of some end users are not satisfactorily met by the market. However regulation is constantly under review and it is possible that other topics could be the subject of Universal Service provisions in the future, including for example the provision of broadband and mobile services. 66 Bibliography SONET SDH, A sourcebook of Synchronous Networking, Edited by Curtis A. Siller, Jr. and Mansoor Shafi, IEEE Press Optical Networks, A Practical Perspective, Rajiv Ramaswami and Kumar N. Sivarajan, Morgan Kauffman History Version V1.0 Date March 2006 Description First issue for client approval 67