Broadband backwater

By on
Broadband backwater
Page 2 of 2  |  Single page
According to Malone, the broadband market can be compared to the mid-1990s where there were dramatic cost reductions in long distance, and everyone was reselling Telstra, which had a short-term benefit and then the market was wiped out.

Malone believes there is an advantage in owning your own network - only resellers of Telstra are feeling the pinch in the marketplace.

"There is a second wave of reselling with service providers such as Optus and Powertel. In our neck of the woods there's Westnet; these guys have been here year after year by continually adding to their services. Also becoming a national reselling network like Pacific Internet's business network can provide an alternative stream of income," says Malone.

"The real question with 30 percent of connected households is no longer on the plumbing but what you do with it. There's VoIP, IPTV and video-on-demand steam rolling their way into the home," he says.

Budde believes IPTV is much more than Hollywood movies, premier league sport and TV in general. "Regional players could make local and regional video services available (local museums, events, local government, and so on)," he says. "Market-based ISPs could also offer triple-play models based on their customers' profiles."

Video-on-demand moves broadband beyond the PC, "and the race is on to link digital video recorders (DVRs)", says Budde.

"The best example of this is the Netherlands. TV rights to the Dutch Premier Soccer League are bought by broadband suppliers. This has spearheaded the Dutch into second position, trailing only Korea on the OECD broadband penetration list," Budde says.

Malone believes the market is a year away from making these services a standard. There are some trials of it now, but the general problem with video-on-demand is not the speed suppliers can get it to the customer but the issue of getting it from the computer and then quickly into the lounge room. However, Malone feels "set-top-boxes are still not up to scratch".

Out of these technologies VoIP has made a big entrance into the Australian market and according to the experts it is here to stay.

Gary McLaren, AAPT's IProvide director of marketing and products, sees broadband as the enabling technology for a range of applications for the SME market that his company is serving with its partners. "The increased speeds on offer (especially the upstream speed increases with ADSL2+) will make it easier to deploy quality VoIP and video over IP services to businesses," he says.

"At the moment we are using standard ADSL and G.SHDSL to deliver high quality business grade VoIP to businesses with four to 45 PSTN equivalent lines. With the enhanced speeds of ADSL2+ this will naturally be able to be increased but will also allow more services to share the link at the same time," he says.

"Companies will be able to participate in videoconferencing and other real-time interactive media dialogues with their customers, employees and suppliers."

McLaren says in his experience businesses will pay for these services once they understand the benefits and the return on investment. Clearly this comes down to the way businesses use the technology to increase their productivity and save costs elsewhere in their business.

Taking it home

Internode's Hackett believes that for IPTV and video-on-demand to come into fruition in the home sector, Telstra needs to look at building a fibre-to-the-home (FTTH) network. FTTH is a fibre connection leaving an end office or exchange and connecting directly to a home or premise without a DSL or LAN connection in between.

There are currently more than 900 cities/communities with FTTH deployments in the US. In that region the number for the service grew by 34 percent during the second quarter and 66 percent since the fourth quarter, 2005, according to a report released from Ovum-RHK.

The report shows the 463,000 FTTH subscribers put the US second only to Japan in FTTH penetration. At the end of the first quarter 2006, Japan had more than 5.4 million FTTH subscribers.

Hackett says Telstra decided recently to scrap its decision to for a fibre-to-the-node network (FTTN) upgrade, despite media reports. This "came as huge sigh of relief to service providers in the broadband market".

Telstra declared it will no longer build a new $4 billion fibre optic network after negotiations with the ACCC broke down. The telco says the talks with the ACCC about the FTTN had reached an impasse over costs. "What basically happened was Telstra realised no-one was going to cave into their demands. FTTN would have meant the telco would have the cable network back in their control," he says.

"This would have allowed Telstra to box in the network and service providers who wanted to build their own infrastructure on top of that cable. They would have had to pay Telstra whatever price the telco wanted for use of the cable," he says.

Hackett says all the money Internode and other service providers put into the infrastructure used to provide broadband services to customers would have been destroyed, along with it these companies. "What Telstra should be doing is lead the way in broadband technology. All the money it wanted to invest is FTTN should have gone into a FTTH," he says.

Threats to the connection

The burgeoning growth of broadband also brings with it a whole new suite of security concerns, over and above the normal use of the internet. A legitimate concern of any diligent CIO is whether the introduction of a wireless technology could weaken the integrity of their IT network, leaving it vulnerable to a new class of security attack.

These threats broadly fall into the following two areas: loss of information and unsecured access to a connection.

The first point to address is the notion that wireless is an inherently less secure medium than wired solutions. If no encryption is used, information is transmitted 'in the clear'. This means that anyone with the ability to tap into a wireless connection will be able to 'listen in' on the communication. This situation occurring can be as simple as a user not being aware of this type of risk and not enabling encryption on their link.

However, users should also be very wary of logging on to unknown or 'rogue hot spots' where public internet access can be obtained. Often there is something more sinister at work here with plenty of documented cases of hotspots set up with the malicious intent of capturing information by stealth.

Since wireless LANs allow peer-to-peer connections, the computer-savvy guy at the corner table may be able to connect to your notebook and 'mooch' your internet connection, look at your unprotected files, or hitch a ride as you connect to your corporate LAN. He can also eavesdrop the airwaves with one of the many wireless sniffers available on the web and watch as you unintentionally reveal your corporate network log-on information, your credit card numbers, IP addresses of your connections and even the contents of emails, instant messages and file attachments.

Those using private networks to connect to wireless broadband such as the services provided by Unwired, IBurst, Vodafone and others are working in a much more secure environment. These services tend to use multiple levels of encryption and authentication to protect their users. The solutions are standards-based and have been architected to overcome known security attacks. Specifically, the architecture is immune to known Wi-Fi attacks. Still, there are some rare but perhaps growing examples of attacks on these systems.

According to Tom Chan, security consultant at MessageLabs, the success of digital mobile communication systems leads to a larger interest for fraudsters, especially as the opportunities for attacking other systems are dwindling. Thus, it can be expected that there will be more investment by the fraudster on more complex equipment, which may lead to new active attacks becoming more of a concern.

"Primarily the fraudsters are manipulating the signalling on the radio interface or masquerading as a network element in order to mount various forms of attack (so-called 'false base station' attacks)," Chan says.

"This is where authentication is not strong and allows unauthorised access to your private wireless connection. The repercussion could be as simple as someone using the link to download porn all night using your bandwidth, or perhaps hijacking the connection to send out spam or conduct other nefarious activities."

According to Chan users should consider that someone smart coming in via this wireless connection can bypass your firewall and hack into your PC or LAN.

Also, remember that going through the public internet via a wireless connection means that you will be exposed to all of the traditional nasties on the web.

Addressing the problem

One way to address this is with software or devices. However, these are less than ideal in that their update behaviour leaves a window of vulnerability.

"A tip for users is that the VPN provides strong authentication and encryption when using a public wireless internet connection. VPNs are effective because they provide end-to-end (corporate server to client terminal) security without the need to have concern about the integrity of the transport networks in-between."

Muscat agrees, and says businesses want security above speed when it comes to broadband. "If you are a SOHO or SMB running a company out of your home and have all your broadband connections running on one network, then you open yourself up to potential problems," he says.

"If just one of the PCs running in private home entertainment gets a virus your business information - like customer invoices and data - also becomes vulnerable. Running a separate line for a business and home is the sensible thing to do, because a business network offers users a VPN to protect their assets."
Previous Page
1 2 Single page
Got a news tip for our journalists? Share it with us anonymously here.
Tags:

Log in

Email:
Password:
  |  Forgot your password?