Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Business Strategies for the Next-Generation Network (Informa Telecoms & Media)

Buy

Carriers and service providers have united around the concept of the Next-Generation Network (NGN). Although leveraging a broad basket of Internet technologies, the NGN is not being planned as the next-generation Internet. In its intention and architecture, it is more accurately described as Broadband-ISDN release 2.0. The NGN is hard to understand because it weaves together so many distinct issues: technology, new kinds of product, a new kind of carrier organization as well as changes in the business model, industry value chain and the shape of a converged future industry itself. This book presents a unified analysis of the complex transformation process that is taking place in the fixed telecoms, mobile telecoms, and broadcast industries and outlines strategies for success.

Th is is not the fi rst attempt to build the Next-Generation Network (NGN). Back in the 1980s, when the carriers controlled innovation, they had come up with a wonderfully complex architecture for voice, data, and video services, called the Broadband Integrated Services Digital Network (Broadband ISDN). Th is architecture was layered upon a standard protocol called ATM—Asynchronous Transfer Mode—and those 53-byte cells were deceptively simple. All the real complexity was in the multiple adaptation layers, which allowed very diff erent services to be successfully adapted to and carried by the relatively uncomplicated ATM transport layer, and in the signaling required to make, manage, and tear-down connections.

As we all know, Broadband ISDN took years of preparation, as the standards bodies tried to design in every conceivable requirement before the standard could be fi nalized and equipment could be built. In the meantime, the Internet happened, using a good enough protocol which couldn’t do one tenth the things ATM was supposed to do. But the things it could do were what were needed back then, and it was extensible in service.

The current concept of the NGN is emphatically not the Internet. Th e NGN is in reality Broadband ISDN mark 2, leveraging Internet technologies. So is it all going to end in tears again? Hard to say—the NGN specifi cation roadmap is now in the hands of all the usual carrier standards bodies, the ITU-T, ETSI, ANSI, etc., and stretches out past 2009. However, unlike with ATM, the new NGN is leveraging protocols and standards that have some real-world experience behind them, and it’s tackling problems of multimedia service networking that we actually have. So it’s got to be in with a chance.

(HTML tags aren't allowed.)

Microsoft WSH and VBScript Programming for the Absolute Beginner
Microsoft WSH and VBScript Programming for the Absolute Beginner

If you’re looking for a solid introduction to programming with WSH and VBScript, then this is the book for you. Developed by computer science instructors, books in the For the Absolute Beginner series teach the principles of programming through simple game creation. By following along with the exercises in this book, you’ll...

High-Throughput Image Reconstruction and Analysis (Bioinformatics & Biomedical Imaging)
High-Throughput Image Reconstruction and Analysis (Bioinformatics & Biomedical Imaging)

Progress in biology is dependent on the ability to observe, measure, and model the behavior of organisms at multiple levels of abstraction, from the microscopic to the macroscopic. There has been a tremendous growth recently in the techniques to probe the structure and workings of cellular and organ-level mechanisms. Significant advances have...

Core Security Patterns: Best Practices and Strategies for J2EE(TM), Web Services, and Identity Management
Core Security Patterns: Best Practices and Strategies for J2EE(TM), Web Services, and Identity Management
Core Security Patterns is the hands-on practitioner™s guide to building robust end-to-end security into J2EE™ enterprise applications, Web services, identity management, service provisioning, and personal identification solutions. Written by three leading Java security architects, the patterns-driven approach...

Professional Microsoft SharePoint 2007 Workflow Programming
Professional Microsoft SharePoint 2007 Workflow Programming
Microsoft Windows SharePoint Services (WSS) 3.0 and Microsoft Office SharePoint Server (MOSS) 2007 provide you with a rich framework for collaborative applications. Packed with practical, real-world examples, this book offers you clear instructions for implementing workflow, custom activities, and conditions into SharePoint applications....
Computer Assisted Exercises and Training: A Reference Guide
Computer Assisted Exercises and Training: A Reference Guide

A comprehensive guide to computer assisted exercises

Readers can turn to this indispensable reference guide for comprehensive and lucid coverage of the operational, technical, and organizational knowledge needed to harness successful and constructive computer assisted exercises (CAX) and war games. It is geared also toward large...

How to Cheat in Adobe Flash CS4: The art of design and animation
How to Cheat in Adobe Flash CS4: The art of design and animation
Need to solve problems quickly to develop creative projects to time and to budget? Want to hone your Flash skills so you can concentrate on your animation? ThenHow to Cheat in Flash is for you! Chris Georgenes shows how to work from the problem to the solution - from the viewpoint of an animator who has been commissioned...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy