throbber

`Telecommunications
`Essentials
`The Complete Global Source
`for Communications Fundamentals,
`Data Networking and the Internet,
`and Next-Generation Networks
`
`Lillian Goleniewski
`
`vvAddison-Wesley
`Boston * San Francisco e New York * Toronto * Montreal
`London * Munich e Paris * Madrid
`Capetown * Sydney * Tokyo * Singapore * Mexico City
`
`
`
`AT&T, Exh. 1009, p. 1
`
`AT&T, Exh. 1009, p. 1
`
`

`

`
`
`
`
`Manyofthe designations used by manufacturersandsellers to distinguish their products are claimedas trade-
`marks. Where those designations appear in this book, and Addison-Wesley, Inc. was aware of a trademark claim,
`the designations have been printed withinitial capital letters or in all capitals.
`
`Lido Telecommunications Essentials® is the registered trademark of The Lido Organization, Inc.
`
`The authorand publisher have taken care in the preparation of this book, but make no expressed or implied war-
`ranty of any kind and assumenoresponsibility forerrors or omissions. Noliabilityis assumedfor incidental or con-
`sequential damages in connection with orarising outofthe use of the information or programs contained herein.
`
`Thepublisheroffers discounts on this book when orderedin quantity for special sales. For more information,
`please contact:
`
`Pearson Education Corporate Sales Division
`201 W. 103"Street
`Indianapolis, IN 46290
`(800) 428-5331
`corpsales@pearsoned.com
`
`Visit AW on the Web: www.aw.com/cseng/
`
`Library of Congress Cataloging-in-Publication Data
`
`Goleniewski, Lillian.
`Telecommunications essentials : the complete global source for communications
`fundamentals, data networking and the Internet, and next-generation networks/ Lillian Goleniewski.
`p. cm.
`Includes bibliographical references and index.
`ISBN 0-201-76032-0
`1. Telecommunication. I. Title.
`
`TK5101 G598 2002
`621.382—dc21
`
`Copyright © 2002 by Pearson Education,Inc.
`
`2001053752
`
`All rights reserved. No part of this publication maybe reproduced,stored in a retrieval system, or transmitted, in
`any form, or by any means,electronic, mechanical, photocopying, recording, or otherwise, withoutthe prior con-
`sent of the publisher. Printed in the United States of America. Published simultaneously in Canada.
`
`For information on obtaining permission for use of material from this work, please submit a written requestto:
`
`Pearson Education, Inc.
`Rights and Contracts Department
`75 Arlington Street, Suite 300
`Boston, MA 02116
`Fax: (617) 848-7047
`
`ISBN 0-201-76032-0
`Text printed on recycled paper
`
`123456789 10—CRS—0504030201
`First printing, December 2001
`
`|
`
`|
`
`|
`
`i
`
`AT&T, Exh. 1009, p. 2
`
`
`AT&T, Exh. 1009, p. 2
`
`

`

`LAN Characteristics
`
`Table 8.2 LAN Technologies and Cabling Requirements
`| Technology
`Type of Cable —_
`
`10Base5
`
`Ethernet (10Mbps)
`
`Thick coax
`Thinccoax
`
`10BaseFL
`
`2 strands of multimode optical fiber
`
`detect (CSMA/CD).
`
`Short-ie multimode mpeeafiber
`Long-weveinath singlemode eben fiber
`Coax erRecable
`alpae Cat 5 or Cat 5e UTP
`2-pair Cat 6 (curently aa TIAdealtcape
`
`Fast Ethernet (100Mbps)
`
`2-PeltCat5 UTP
`-4-pairCat 3 UTP
`
`2-pair Cat 3 UTP
`2 strands of multimode optical fiber
`
`Gigabit Ethernet (1 Gbps)
`
`1O0BaseTX
`100BaseT4
`
`100BaseT2
`100BaseFX
`
`10Q0Base5X
`1000BaseLX
`1O000BaseCX
`1000BaseT
`1000BaseTX
`
`The prevailing standard in the world is Ethernet. It generally appears as Fast
`Ethernet or Gigabit Ethernet in the backbone, connecting together individual
`Fast Ethernet or 1OMbps Ethernet LAN segments (see Figure 8.3).
`
`LAN Access Methods
`
`The third main LAN characteristic is the access methods, which are involved in
`determining who gets to use the network and whentheygetto use it. There are
`two main approaches:
`token passing and carrier-sense multiple-access/collision
`
`AT&T, Exh. 1009, p. 3
`
`

`

`Telecommunications
`Essentials
`The Complete Global Source
`for Communications Fundamentals,
`Data Networking and the Internet,
`and Next-Generation Networks
`
`Lillian Goleniewski
`
`."T Addison-Wesley
`Boston • San Francisco • New York • Toronto • Montreal
`London • Munich • Paris • Madrid
`Capetown • Sydney • Tokyo • Singapore • Mexico City
`
`AT&T, Exh. 1009, p. 4
`
`

`

`Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trade(cid:173)
`marks. Wh ere those designations appear in this book, and Addison-Wesley, Inc. was aware of a trademark claim,
`the designations have been printed with initial capital letters or in all capitals.
`
`Lido Telecommunications Essentials® is the registered trademark of The Lido Organization, Inc.
`
`The author and publisher have taken care in the preparation of this book, but make no expressed or implied war(cid:173)
`ranty of any kind and assume no responsibility for errors or omissions. o liability is assumed for incidental or con(cid:173)
`sequential damages in connection with or arising out of the use of the information or programs contained herein.
`
`The publisher offers disco unts on this book when ordered in quantity for special sales. For more information,
`please contact:
`
`Pearson Education Corporate Sales Division
`201 W 103rd Street
`Indianapolis, IN 46290
`(800) 428-5331
`corpsales@pearsoned.com
`
`Visi t AW on the Web: www.aw.com/csengl
`
`Library of Congress Cataloging-in-Publication Data
`
`Golen iewski, Lillian .
`Telecommunications essentials : the complete global source for communications
`fundamentals, data networking and the Internet, and next-generation networks I Lillian Goleniewski.
`p. em.
`Includes bibliographical references and index.
`ISBN 0-201-76032-0
`1. Telecommunication . 1. Title.
`
`TK5l01 G598 2002
`621.382-dc21
`
`Copyrigh t© 2002 by Pearson Education, Inc.
`
`2001053752
`
`All rights reserved. No part of this publication may be reproduced , stared in a retrieval system, or transmitted, in
`any form , or by any means, electronic, mechani cal, photocopying, recording, or otherwise, without the prior con(cid:173)
`sent of the publisher. Printed in the United States of America. Published simultaneously in Canada.
`
`For information on obtaining permission for use of material from this work, please submit a written request to:
`
`Pearson Education, Inc.
`Rights and Contracts Department
`75 Arlington Street, Suite 300
`Boston, MA 02116
`Fax: (617) 848-7047
`
`ISBN 0-201-76032-0
`Text printed on recycled paper
`
`1 2 3 4 56 7 8 9 10-CRS-0504030201
`f irst printing, December 2001
`
`AT&T, Exh. 1009, p. 5
`
`

`

`Cha er
`
`Next-Generation Network
`Services
`
`This chapter investigates traditio nallnternet services, as well as new generations of
`applications and the networ k platforms that support those applications. It dis(cid:173)
`cusses virtual private networks (VPNs) , security, various uses of Voice over IP
`(VoiP) networks, and developments in the streaming media arena and emerging
`applications.
`
`• Traditional Internet Applications
`
`Traditional Internet applications are called elastic applications because they can
`work without guarantees of timely delivery. Because they can stretch in the face of
`greater delay, they can s till perform adequately, even when the network faces
`increased congestion and degradation in performance. The following are th e most
`widely used elastic applications:
`
`• E-mail-The most widely used of the Internet applications, generating sev(cid:173)
`eral gigabytes of traffic per month, is e-mail. Because there is a standardized
`convention for the e-mail address-usemame@domainname-various com(cid:173)
`panies can interoperate to support electronic messaging.
`• Telnet-Tel net is one of the original ARPANET applications. It enables
`remote login to another computer that's running a Telnet server and allows
`
`AT&T, Exh. 1009, p. 6
`
`

`

`330
`
`Chapter 11
`
`• Next-Generation Network Services
`
`you to run applications present on that computer, with their outputs
`appearing in the window on your computer.
`File Transfer Protocol (FTP)-FTP allows file transfers to and from remote
`hosts. That is, you can use FTP to download documents from a remote host
`onto your local device.
`The World Wide Web- Key aspects that identify the Web are the use of the
`uniform resource locator (URL) and the use of Hypertext Transfer Protocol
`(HTTP)-the client/server hypermedia system that enables the multimedia
`point-and-dick interface. HTTP provides hyperlinks to other documents,
`which are encoded in Hypertext Markup Language (HTML), providing a
`standardized way of displaying and viewing information contained on serv(cid:173)
`ers worldwide. Web browsers are another important part of the Web envi(cid:173)
`ronment-they interpret the HTML and display it, along with any images,
`on the user's local computer. The ease of using the Web popularized the use
`of URLs, w hich are available for just about any Internet service. (The URL
`is the syntax and semantics of formalized information for location and
`access of resources via the Internet. URLs are used to locate resources by
`providing an abstract identification of the resource location.)
`
`So, how are people actually using the Internet? Greenfield Online conducts
`polls online. In November 2000, Greenfield Online (www.greenfieldonline.com)
`reported that the Internet was being used as follows:
`
`98% of Internet users went online to check their e-mail.
`• 80% of Internet users were checking for local information, such as movie
`schedules, weather.updates, or traffic reports.
`• 66% of Internet users were looking for a site that provided images and
`sounds.
`• 66% of Internet users wanted to shop at sites that provided images of the
`products they were interest in.
`53% of Internet users downloaded some form of a large file.
`• 3 7% of Internet users listened to Internet radio.
`
`This shows that increasingly there is interest in imagery, multimedia, and
`entertainment-type aspects of the Internet. These are advanced real-time applica(cid:173)
`tions that are highly sensitive to timely data delivery. Therefore, any application
`that includes VolP, audio streaming, video streaming, or interactive multimedia
`needs to be addressed by the administration of Quality of Service (QoS). The lack
`
`AT&T, Exh. 1009, p. 7
`
`

`

`VPNs
`
`3 31
`
`of control over QoS in the public Internet is preventing the deployment of these
`new applications at a more rapid pace.
`Today's flat-rate pricing for Internet access is compatible with the Internet's
`lack of service differentiation, and it is partially responsible for that structure as
`well. The main appeal of a flat-rate pricing scheme is its simplicity. It means pre(cid:173)
`dictable fees for the users, and it means providers can avoid the administrative
`time and cost associated with tracking, allocating, and billing fo r usage. It also
`gives companies known expectations for payments , facilities planning, and bud(cid:173)
`geting. However, as QoS emerges within the Internet, the ability to differentiate
`services will result in differentiated pricing, thereby allowing revenue-generating
`service levels and packages-and that's extremely important. As we've discussed
`several times so far in this book , developments in optical networking and in wire(cid:173)
`less networking are providing more and more bandw idth. Hence, the cost-the
`cents per minute that you can charge for carrying traffic-is being reduced. lf net(cid:173)
`work operators are going to continue to make money in the future , they will n eed
`to do so through the administration of value-added services, differentiated perfor(cid:173)
`mance, and tiered pricing. Therefore, the QoS aspect is very important to the
`materialization of new revenue-generating services.
`Key applications from which service providers are expected to derive revenues
`include e-commerce, videoconferencing, distance learning and education net(cid:173)
`works, Webcasting, multiplayer gaming, unified messaging, call centers, interac(cid:173)
`tive voice response, and IP-based centrex systems. Evolving next-generation
`networks- such as VPNs, VoiP and Packet over IP, streaming audio and video,
`multimedia collaboration , network caching, application hosting, location-based
`online services, software downloads, and security services-are introducing a vari(cid:173)
`ety of Class of Service (CoS) and QoS differentiators.
`
`• VPNs
`
`A big driver of interest in VPNs is that customers increasingly need to communi(cid:173)
`cate with people outside their enterprise, not just those inside the enterprise. As
`mentioned in Chapter 6, "Data Communications Basics," in the 1980s, about 80%
`of the information that was used within a given address of a business came from
`within that address. Only 20% was exchanged outside the walls of that location.
`Today, the relationship has reversed. As much as 80% of information exchanged is
`with points outside a given business address.
`Another reason for interest in VPNs is that customers want to quickly and
`securely change their access points and needs as changes occur in their businesses.
`Many strategic alliances and partnerships require companies to exchange messages
`quickly. Some of these are temporary assignments-for example, a contractor
`
`AT&T, Exh. 1009, p. 8
`
`

`

`332
`
`Chapter 11
`
`• Next-Generation Network Services
`
`Telecommuters
`•
`~
`:;;::~
`
`' -
`
`Dialu~ /
`
`Dialup /San Francisco
`/
`headquarters
`
`rill Mobile
`~users
`
`London
`branch office
`
`Figure 11.1 An enterprise network based on leased lines
`
`building out a fiber-optic loop or an applications developer building a new billing
`system-that migh t last a few months, during which time the individuals involved
`need to be incorporated into the network. Leased lines are infamous for requiring
`long waits for provisioning-often 6 months to 18 months! VPNs allow rapid pro(cid:173)
`visioning of capacity where and when needed.
`What we see emerging is a requirement for networks that can be very quickly
`provisioned and changed in relationship to organizational structures. This results in
`a steady migration of traffic away from the traditional networks, based on leased lines
`(see Figure ll.l), to public networks. As a result, we're seeing a steady growth in the
`pseudoprivate realm of the VPN (see Figure 11.2). A VPN is a logical network that
`isolates customer traffic on shared service provider facilities. In other words, the
`enterprises traffic is aggregated with the traffic of other companies. VPNs have been
`around for quite some time-since X.25 closed user groups on the packet-switched
`network, and with the AT&T Software-Defined Network (SDN) on the circuit(cid:173)
`switched networks. A VPN looks like a private network, but it runs across either the
`public circuit-switched network or public packet-switched data networks. Thus,
`VPNs are not just a solution within the IP realm- a VPN is a concept, not a specific
`set of technologies, and it can be deployed over a wide range of network technolo(cid:173)
`gies, including circuit-switched networks, X.25, lP, Frame Relay, and ATM.
`A VPN uses a shared carrier infrastructure. It can provide additional band(cid:173)
`width on demand, which is an incredible feat, as compared to the weeks that it
`normally takes to add bandwidth to dedicated networks. Carriers build VPNs with
`
`AT&T, Exh. 1009, p. 9
`
`

`

`VPNs
`
`Singapore
`branch office
`
`San Francisco
`headquarters
`
`London
`branch office
`
`Figure 11.2 An enterprise network using a VPN
`
`advanced survivability and restoration capabilities, as well as network management
`tools and support, so that QoS can be considered and service-level agreements
`(SLAs) can be administered and met.
`Two basic VPN deployment models exist: customer based and network based.
`In customer-based VPNs, carriers install gateways, routers, and other VPN equip(cid:173)
`ment on the customer premises. This is preferred w hen customers want to have
`control over all aspects of security. In network-based VPNs, the carrier houses all
`the necessary equipment at a point of presence (POP) near the customer's location.
`Customers that want to take advantage of the carrier's VPN economies of scale pre(cid:173)
`fer this type of VPN.
`
`VPN Frameworks
`Contemporary VPNs can be described as belonging to one of two categories: th e
`Internet-based VPN and the provisioned VPN.
`
`Internet-Based VPNs
`In an Intemet-based VPN (see Figure 11.3), smaller ISPs provide local access services
`in defined geographical regions, requiring an enterprise to receive end-to-end services
`from multiple suppliers. An Internet-based VPN uses encryption to create a form of
`closed user group, thereby isolaLing the enterprise traffic and providing acceptable
`security for the enterprise across the public shared packet network. However, because
`
`AT&T, Exh. 1009, p. 10
`
`

`

`334
`
`Chapter 11
`
`• Next-Generation Network Services
`
`Internet
`
`1
`
`~
`~ :' ... ,
`--
`). Tier 1
`.
`.
`ISP
`Peenng Po1nts
`,
`~ ~
`
`-
`
`Internet Exchange.
`Network Access Points
`(NAPs)
`
`. -;/~
`ISP v
`Tier 1
`"
`
`Peering Points
`
`Figure 11.3 An Internet-based VPN
`
`it involves multiple lSPs in the delivery of the VPN, the performance is unpredictable.
`The biggest problem of having multiple suppliers is the inability to define and meet
`consistent end-to-end bandwidth or performance objectives.
`Figure 11.4 shows what is involved in providing an Internet-based VPN. The
`customer would have on the premises a wide variety of servers that dish up the
`corporate content, the finance systems, the customer service systems, and so on . A
`VPN is responsible for the encapsulation of the information and hence the security
`aspects. Remote Authentication Dial-in User Services (RADIUS), an authentication
`and access control server, is used for purposes of authenticating wheth er a u ser is
`allowed access into the corporate resources. The RADIUS server connects to a fire(cid:173)
`wall, which is used to determine whether traffi c is allowed into or out of the net(cid:173)
`work. The router selects the optimum path for the messages to take, and the circuit
`physically terminates on a channel service unit/data service unit (CSU/DSU). A
`private line interfaces with the Internet provider's POP From that point, the VPN
`either uses the public Internet that's comprised of multiple lSPs, or it relies on lP
`backbones provided by a smaller group of providers. Users who are working on
`mobile devices would have laptops equipped with the client and VPN services nec(cid:173)
`essary for encapsulation and the administration of security.
`
`Provisioned VPNs
`VPNs rely on the capability to administer preferential treatment to applications, to
`users, and so on. The public In ternet does not support preferential treatment
`
`AT&T, Exh. 1009, p. 11
`
`

`

`VPNs
`
`Remote
`Users
`
`Laptops and PCs
`w ith client VPN
`encapsulation . - -""'
`and security software
`or Token cards
`
`Remote
`Site
`
`Private line
`to Internet POP
`
`VPN server
`
`Authentication and
`access control server
`
`Figure 11.4 The parts of an Internet-based VPN
`
`VPN server
`(encapsulation
`and security)
`
`Authentication and
`access control server
`(RADIUS)
`
`because it is subj ect to delay, j itter, and loss; it is therefore unsuitable for next(cid:173)
`generation services that require high performance. ln most cases, to accommodate
`business customers that are interested in such advanced services and who demand
`SLAs, the underlying transport is really Frame Relay or ATM. These Frame Relay
`and ATM VPNs offer greater levels of QoS and can fulfill the SLAs that customers
`and vendors agree to. They do, however, require that the cus tomer acquire an
`integrated access device (lAD) to have on the premises, which can increase the
`deployment cost significantly. lADs enable the enterprise to aggregate voice, data,
`and video traffic at the customer edge.
`A provisioned VPN (see Figure ll.S) is a packet-switched VPN that runs across
`the service provider's backbone, generally using Frame Relay or ATM. This type of
`VPN is built on OSl model Layer 2 virtual circuits, such as those used by Frame
`Relay, ATM , or Multiprotocol Label Switching (MPLS) , and it is provisioned based on
`customer orders. Virtual circuits based on predetermined locations create closed user
`groups and work well to carve out a VPN in a public shared network, by limiting
`access and usage to the provisioned VPN community. However, encryption is still
`required to securely protect the information from theft or modification by intruders.
`The provisioned VPN is differentiated from the lP VPN by its ability to support
`multiple protocols and by the fact that it offers improved performance and man(cid:173)
`agement. These VPNs are characterized as having excellent performance and secu(cid:173)
`rity, but the negative is that a single vendor offers both reach and breadth in terms
`of service offerings.
`
`AT&T, Exh. 1009, p. 12
`
`

`

`336
`
`Chapter 11
`
`• Next-Generation Network Services
`
`~- - - - ------ - ----- -
`
`Service
`Provider
`Networ k
`
`,. ,. ,. ,. Virtual Circuits ' ' ...
`Between Locations
`
`'
`
`TO - -+--.
`Internet
`
`,.
`-- - -- ------- ----- --- ---
`
`/-.._
`
`---
`
`Figure 11 .5 A provisioned VPN
`
`Figure 11.6 shows what the equipment would like look at a customer premise in
`support of a Frame Relay- or an ATM-based VPN. The customer would have an lAD
`that would allow voice and data to be converged at the customer premise. The lAD
`would feed into the data communications equipment, over which a circuit would go to
`the service provider's POP. At the service provider's POP would be a multiservice access
`device that enables multiple protocols and interfaces to be supported and that provides
`access into the service provider's core network, which would be based on the use of
`Frame Relay or ATM. To differentiate Frame Relay- and ATM-based VPNs from Internet(cid:173)
`based VPNs, service providers stress that multiple protocols are supported and that
`they rely on the use of virtual circuits or MPlS labels to facilitate the proper path,
`thereby ensuring better performance and providing traffic management capabilities.
`To further differentiate Frame Relay- or ATM-based VPNs from regular Frame
`Relay or ATM services, additional functions-such as packet classification and n·af(cid:173)
`fic isolation , the capability to hand le multiple separate packet-forwarding tables
`and instances of routing protocols for each customer-
`reside at the edge.
`
`VPN Applications
`A VPN is an architecture, a series of products and software functions that are tied
`together and tightly calibrated. Managing a VPN entails dealing primarily with two
`issues: security policies and parameters and making sure that applications function
`within the latency requirements.
`
`AT&T, Exh. 1009, p. 13
`
`

`

`VPNs
`
`Remote
`Users
`
`•
`
`Dialup to
`Internet POP
`~
`-~
`
`Service Provider POP FR or ATM
`Virtual Circuit (VC)
`
`Remote
`Access Device
`
`Service
`provider
`network
`manag~ment
`'
`
`Remote
`Site
`
`LAN
`traffic
`
`SNA
`traffic
`
`Voice Other
`traffic
`traffic types
`
`Customer access to .-----....J
`network management
`
`Figure 11 .6 A Frame Relay- o r ATM-based provisioned VPN
`
`VPN applications provide maximum opportunities to save money and to make
`money- by substituting leased lines with Internet connectivity, by reducing costs
`of dialup remote access, and by stimulating new applications, using extranets.
`These savings can be substantial. According to TeleChoice (www.telechoice.com) ,
`in the realm of remote access, savings over customer-owned and maintained sys(cid:173)
`tems can range from 30% to 70%; savings over traditional Frame Relay services can
`range from 20% to 60%; savings over leased lines or private lines can range from
`50% to 70%; and savings over international private lines can be up to 90%.
`l t is important to be able to effectively and easily manage the VPN environ(cid:173)
`ment. You need to consider the capability to track the tunnel traffic, the support for
`policy management, the capability to track QoS, the capability to track security
`infractions, and the support for public key certificate authorities (CAs).
`The one-stop-shopping approach
`is
`to VPNs- managed VPN services-
`designed to lock in users and to redu ce costly customer churn, but with this
`approach, interoperability is very restricted. Managed VPNs provide capabilities
`such as IP connection and transport services, routers, firewalls, and a VPN box at
`the customer site. Benefits of this approach include the fact that it involves a single
`service vendor, SLAs, guaran teed latency and band•vidth, and the security of traffic
`being confined to one network. Approximately one-third of VPN users opt for such
`a managed service.
`There are three maj or applications of VPNs-intranets (that is, site-to-site
`VPNs) remote access, and extranets-which are examined in the following sections.
`
`AT&T, Exh. 1009, p. 14
`
`

`

`338
`
`Chapter 11
`
`• Next-Generation Network Services
`
`Headquarters
`
`Firewall
`
`Internal network
`
`/
`External network
`
`Figure 11.7 An intranet-based VPN
`
`_!.. _.!. ~~
`Users Laser printer
`Branch Office
`
`Intranet VPNs
`Intranet VPNs are site-to-site connections (see Figure ll . 7). The key objective of an
`intranet VPN is to replace or reduce the use of leased-line networks, traditional rout(cid:173)
`ers, and Frame Relay services. The cost savings in moving from private networks to
`Internet-based VPNs can be very high , in the neighborhood of 50% to 80% per year.
`Remember that Internet-based VPNs allow less control over the quality and perfor(cid:173)
`mance of applications than do provisioned VPNs; this is a bit of a deterrent, and
`many clients still want to consider the Frame Relay- or ATM-based ATMs, which
`would provide better QoS. The savings might drop a bit, but the cost of a provisioned
`VPN would be substantially less than the cost of using leased lines.
`There are a few key barriers to building out more intranets based on VPNs:
`
`No standardized approach to encryption
`• Variance between vendors' products, which leads to interoperability problems
`• Lack of standards regarding public key management
`•
`Inability of today's Internet to provide end-to-end QoS
`
`Remote Access VPNs
`The most interesting and immediate VPN solution for most customers is the
`replacement of remote access servers. VPN remote access implementations can
`
`AT&T, Exh. 1009, p. 15
`
`

`

`VPNs
`
`save customers from 30% to 70% over traditional dialup remote access server
`deployment. Remote access servers provide access to remote users, generally via
`analog plain old telephone service (POTS) lines, or, perhaps, ISDN connections ,
`including dialup protocols and access control for authentication (administered by
`the servers). However, a remote access server requires that you maintain racks of
`modems, the appropriate terminal adapters for ISDN services, or DSL-type
`modems for DSL services. You also need remote access routers, which connect
`remote sites via a private line or public carriers and provide protocol conversion
`between the LANs and WANs. To have an internal implementation of remote
`access, you have to acquire all these devices, as well as the talent to maintain them.
`If an enterprise needs remote access connections outside local calling areas,
`and/or if it needs encrypted communications, it is generally fairly easy to justify a
`VPN service over an enterprise-based remote access server. The initial cost of hard(cid:173)
`ware for a VPN approach is about 33% less than the cost of hardware for a tradi(cid:173)
`tional dialup remote-access server deployment. The customer also saves on charges
`for local access circuits, and costly toll and international charges are eliminated.
`By virtue of supporting a greater range of customers, a service provider that
`offers VPN-based remote access is more likely to support a wider variety of
`broadband access options, including xDSL, cable modems, and broadband wire(cid:173)
`less. VPN-based remote access also reduces th e management and maintenance
`required with modem banks and remote client dial-in problems. For these rea(cid:173)
`sons, remote access represents the primary application for which customers turn
`to VPNs. Figure ll.B shows an example of remote access VPN.
`
`VPN
`server
`
`Headquarters
`
`Figure 11 .8 A remote-access VPN
`
`AT&T, Exh. 1009, p. 16
`
`

`

`340
`
`Chapter 11
`
`• Next-Generation Network Services
`
`Partner A
`Server 1
`
`Partner 8
`
`Firewall/Router/
`VPN Gateway
`
`Server 2
`
`User on Server 2
`
`Figure 11.9 An extranet-based VPN
`
`Extranet VPNs
`Extranet VPNs allow an external organization to have defined access into an enter(cid:173)
`prise's internal networks and resources (see Figure 11.9). There are three major
`categories of extranets: supplier extranets, which focus on speeding communica(cid:173)
`tions along the supply chain; distributor extranets, which focus on the demand
`side and provide great access to information; and peer extranets, which create
`increased intrainclustry competition.
`The key applications for extranets include distribution of marketing and
`product information , online ordering, billing and account history, training policy
`and standards, inventory management, collaborative research and development,
`and e-mail, chat, news, and content.
`A prime example of an extranet is the Automotive Industry Action Group's Auto(cid:173)
`matic Network Exchange (ANX). This exu·anet comprises some 50,000 members
`worldwide. In many ways ANX is producing de facto standards for how extranets
`should be deployed. Check with ANX (www.anxo.com) for the latest information on
`how extranets are evolving and how one of the world's largest extranets is performing.
`
`VPN Gateway Functions
`The main purpose of the VPN gateways that are required to enable VPNs is to set
`up and maintain secure logical connections, called tunnels, through the Internet.
`Key functions of VPN gateways include packet encapsulation, authentication, mes-
`
`AT&T, Exh. 1009, p. 17
`
`

`

`VPNs
`
`341
`
`sage integrity, encryption, key exchange and key management, as well as firewall(cid:173)
`ing, n etwork address
`translation, access control, routing, and bandwidth
`management. The following sections describe these functions in detail.
`
`Tunneling Protocols
`Tunneling is a method of encapsulating a data packet within an lP packet so that it
`can be transmitted securely over the public Internet or a private IP network. The
`remote ends of the tunnel can be in one of two places: They can both be at the edges
`of the service provider's network, or one can be at the remote user's PC and the
`other at the corporate boundary router. Between the two ends of the tunnel, Inter(cid:173)
`net routers route encrypted packets as they do all other lP traffic.
`Three key tunneling protocols are needed in VPNs:
`
`• Point-to-Point Tunneling Protocof (PPTP)- PPTP was developed by
`Microsoft, 3Com, and Ascend, and it is included in Windows 95, Windows
`98, Windows Me, Windows NT, Windows 2000, and Windows XP. PPTP is
`a Layer 2 protocol that can work in a non-lP enterprise environment, which
`is one of its strengths for customers that use multiple protocols rather than
`using only lP. PPTP provides low packet overhead and good compression,
`but its weaknesses are on the security front: It does not provide encryption
`or key management in the published specification, and it essentially relies
`on the user password to generate keys. But all implementations of PPTP
`include Microsoft Point-to-Point Encryption (MPPE).
`Layer 2 Tunneling Protocol (L2TP)- The IETF promotes L2TP, which is a
`merger between PPTP and Cisco's Layer 2 Forwarding (L2F) protocol.
`L2TP is another Layer 2 protocol that can work in a non-IP enterprise envi(cid:173)
`ronment. L2TP is used primarily by service providers to encapsulate and
`carry VPN traffic through their backbones. Like PPTP, it does not provide
`encryption or key management in the published specification (although it
`does recommend lPSec for encryption and key management).
`IP Security (IPSec)-JPSec is an IETF protocol suite that addresses basic
`data integrity and security. It covers encryption, authentication, and key
`exchange. lPSec involves a 168-bit encryption key, although the key size
`can vary, depending on the capabilities of each end of the connection.
`Recent drafts address encapsulating the secured payload, the key manage(cid:173)
`ment protocol, and key creation. lPSec emphasizes security by authenticat(cid:173)
`ing both ends of the tunnel connection, negotiating the encryption protocol
`and key for the encrypted session, and encrypting and decrypting the ses(cid:173)
`sion establishment data. However, IPSec is restricted to lP environments,
`each user is required to have a well-defined public IP address, and lPSec
`cannot run on networks that use network address translation.
`
`AT&T, Exh. 10

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket