PROVIDING INTEROPERABLE SECURE VOICE IN CONVERGING HETEROGENOUS NETWORKS: THE NATO SECURE VOICE STRATEGY

Size: px
Start display at page:

Download "PROVIDING INTEROPERABLE SECURE VOICE IN CONVERGING HETEROGENOUS NETWORKS: THE NATO SECURE VOICE STRATEGY"

Transcription

1 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE PROVIDING INTEROPERABLE SECURE VOICE IN CONVERGING HETEROGENOUS NETWORKS: THE NATO SECURE VOICE STRATEGY Michael Street, Brian Bottesini, Rita Russo NATO C3 Agency, Brussels, Belgium and The Hague, The Netherlands Michael.Street, Brian.Bottesini, Patrick DeLaere SHAPE, Mons, Belgium Gerard Elzinga NATO HQ C3 Staff, Brussels, Belgium Ric Murtland Supreme Allied Command Transformation, Norfolk, Virginia, USA ABSTRACT This paper provides an overview to the NATO secure voice strategy which will ensure the continued provision of the essential user service of secure voice. Even in today s era of network-centric capabilities the need for military users to talk securely to each other remains a crucial requirement. Providing a reliable voice service over heterogeneous networks presents an increasingly challenging problem as network technologies proliferate and military users make greater use of networks over which they have limited control via service provision contracts for telecommunication services. The NATO secure voice strategy (SVS) [1] sets out a course through the evolving network technologies, accounting for obsolescent and developing technologies, and reflecting the needs of the operational community for interoperability to support current and future NATO operations. Keywords: Secure voice, heterogeneous networks, SCIP, NINE. INTRODUCTION Even in a network centric environment voice communications are an essential service for military planning and operation execution. Secure voice communication provides a service which is still unrivalled for its responsiveness, interaction and trustworthiness. In addition to the military role, in NATO secure voice is one of the key services used for political consultation and command and control of military forces. Therefore even in the current era of NATO network-enabled capability (NNEC) operations, secure voice remains an essential requirement. The NATO secure voice strategy addresses NATO s transition strategy towards network-enabled end-to-end (person-to-person or person-to-process) secure voice. The strategy leads from the current position and addresses incremental transitions towards the desired end state of omnipresent secure voice.

2 Prague, Czech Republic - September, 29-30, 2009 NEED FOR A SECURE VOICE STRATEGY The NATO secure voice strategy has been developed in response to key drivers, namely: Evolving, diverse communication network technologies, Equipment obsolescence, Availability of new cryptographic technologies, Demand for wider interoperability, Need for simplified key distribution, Perceived inadequacies of many current secure voice solutions. Equipment obsolescence and changing network technologies are endangering the current secure voice capability. Historic key management mechanisms are inefficient in current operations. Plans for the telecommunication networks necessary to support NNEC, coupled with new cryptographic technologies, can offer significant enhancements to available secure voice services and their mobility and interoperability. CURRENT STATUS Today s communications networks and their associated technologies are changing at an ever increasing rate. Traditional real-time voice communication circuits are steadily being replaced by other technologies such as Voice over Internet Protocol (VoIP). The dramatic increase in the use of mobile (e.g. cellular, GSM) phones has changed the way we communicate and users expectations. Individuals are always connected not only with voice communications, but with and web browsing capabilities as well. Many developing countries are even completely by-passing the implementation of terrestrial telephone infrastructures and establishing cellular telephone networks instead. In the tactical environment, voice communications require interoperable and flexible infrastructures to support the rapid reaction capabilities of an operational commander. Current operational needs require these services to be interoperable between wired and wireless networks, between networks deployed by different nations and between military and civilian organisations. The services are required within and between all levels of command. The requirement for secure voice communications adds an additional layer of complexity to this already challenging environment due to the additional stringent timing and reliability requirements for the synchronization of security protocols, cryptographic algorithm exchanges needed to support a realtime encrypted service and the need for a supporting cryptographic key management infrastructure. NATO has several secure voice solutions in use today, shown in figure 1. These solutions have largely evolved independently of one another, resulting in the terminals and their supporting infrastructures being non-interoperable. Figure 1 shows a diverse range of non-interoperable secure voice solutions and only considers secure voice in NATO. Virtually every nation has at least one, and often many, bespoke secure voice equipments, usually developed exclusively for a specific network technology e.g. PSTN, ISDN, GSM, CDMA, personal satellite communications, high-frequency radio etc.

3 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE Figure 1. Disparate secure voice solutions Secure voice interoperability between each of the systems shown in figure 1 where possible is only possible through bespoke secure voice gateways. These have to be developed specifically for particular pairs of secure voice equipment. Use of bespoke gateways has a number of problems. Voice is decrypted and decoded back to analogue, therefore the gateway must be located in a secure area and voice quality is degraded [2]. Bespoke nature often relies on use of end terminal secure telephones in the gateway, requiring manual operators or inelegant solutions such as mechanical fingers for the gateways to control the secure telephone. Equipment limitations restrict the number of secure calls between different secure voice cryptographic families to the number of channels supported by the gateway. Inability to support secondary dialling e.g. the user must dial the number of the gateway but has no mechanism to provide the desired destination number. This can be resolved by using a manual operator or through more sophisticated methods using a programmable gateway [3]. User Perception and Voice Encoding Secure voice services depend on voice coders 1 to digitise the voice before it is encrypted. The voice coder is one of the closest functions to the user, therefore the behaviour and performance of the voice coder has a major impact in the user s perception of particular secure voice equipment. 1 The term voice coder is used generically in this paper where distinction may be made between voice coders and waveform coders.

4 Prague, Czech Republic - September, 29-30, 2009 Voice coder performance is heavily influenced by the data rate available between the terminals 2 and by the signal processing power available to provide real-time analysis and synthesis of the voice signal. The continuing increase in available signal processing technology results in improvements in voice quality as more sophisticated voice coders become realisable. The widespread, but aging Narrow-Band Secure Voice II (NBSV-II) equipment uses STANAG 4198, a linear predictive coder (LPC-10e). This voice coder is limited by the technology available thirty years ago when it was developed. It was also limited by the need to operate on strategic networks of the time which could only offer 2.4 kbps links. As a consequence, voice quality and intelligibility of LPC-10e is considered poor by many users today. In contrast STANAG 4209, a continuous slope variable delta (CVSD) waveform coder was developed for tactical networks. On these networks typically covering shorter distances and with fewer network switches - higher data rates (16 kbps) were available, allowing a higher rate, simpler coder to be used. Using a range of voice coders allows for the optimum compromise between network limitations and quality of the voice service. However, the more voice coder standards that are used to provide secure voice the greater the problem to provide interoperability. As a result, the NATO secure voice strategy is restricting the number of voice coders. In order to support secure voice service on constrained networks, the mixed excitation linear prediction-enhanced (MELPe) coder is used. This coder, standardised as STANAG 4591, provides a reasonable voice quality on 2.4kbps channels, making it suitable for narrowband channels such as radio and satellite links. Where appropriate, commercial voice coder standards are also encouraged, primarily G.729D and G.711. These three voice coders can cover a variety of scenarios, ranging from toll-quality voice on high-capacity networks (G.711 at 64kbps); STANAG 4591 offering near toll-quality voice on very narrowband channels; and G.729D covering the middle ground between these two extremes. Figure 2. Speech quality of voice coders in diverse noise environments [4] 2 For this reason 2G cellular systems use a variable bit rate (VBR) codec, so users can be given a high quality voice service possible, but quality and bit rate can be reduced when the network is congested in order to increase network capability.

5 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE Figure 2 shows the relative performance of three voice coders routinely used in secure voice equipment: the historic LPC-10e and CVSD coders and the more modern MELPe. Figure 2 shows the speech intelligibility performance which is measured as a %. This is shown in four different noise environments; quiet - with an infinite signal to noise ratio (SNR) is shown at the back of the graph, a modern office environment typical SNR 20dB, a noisier environment 12dB SNR, and finally a very noisy environment is shown at the first of the graph with a 6 db SNR. Figure 2 shows that MELPe offers significant improvement in performance in all environments over the other 2.4kbps coder, LPC-10e. Compared to CVSD, MELPe offers improved performance in all but the noisiest of environments at a fraction of the data rate. MELPe is therefore the natural choice of voice coder for low throughput networks and should lead to an improvement in performance for the users. NEW TECHNOLOGIES Two recent technologies provide significant portions of the solution to the complex problem of providing secure voice services on NATO networks. These are the use of voice over secure IP networks (VoSIP) and the NATO secure communication interoperability protocol (SCIP). Secure communication interoperability protocol (SCIP) SCIP has been developed to provide end to end encrypted voice and data communication between terminals operating on heterogeneous networks. As such it meets many of the requirements for NATOs secure voice strategy and provides a fundamental piece of the solution. STANAG 5068 (Draft) covers the suite of SCIP specifications that define SCIP. SCIP is the product of a multi-national group involving NATO, national governments and industry. The SCIP specifications are available to nations and industry in order to develop interoperable secure voice and data terminals. As a result a SCIP terminal from vendor A in nation X will be interoperable with a SCIP terminal from vendor B in nation Y. SCIP uses the STANAG 4591 voice coder which offers state of the art voice coding, giving comparatively high voice quality and intelligibility from a 2.4 kbps channel. SCIP terminals place some demands on the intervening networks, although in general these are only that the networks conform to the characteristics and interfaces defined in their respective standards e.g. PSTN (V.32), ISDN (V.110), GSM (bearer service 26) etc. In providing SCIP over IP networks SCIP relies on standard VoIP services and protocols rather than rely on a proprietary VoIP solution. Session initiation protocol (SIP) and real-time protocol (RTP) are both used by SCIP terminals to establish an IP connection between SCIP terminals which is capable of transporting the real-time encrypted traffic needed to support SCIP [5]. SCIP over IP may be referred to as secure voice over IP (SVoIP). SCIP was developed to operate over heterogeneous networks therefore the network interfaces must also support SCIP. This is of particular concern at the boundary between circuit-switched and packet-transfer networks. Here, SCIP uses the ITU-T standard v [6]. V is commonly referred to as modem over IP. Although this is an agreed international standard, it is not widely available and steps must be taken to ensure that military and commercial networks will be able to support SCIP across these interfaces. The SVS recommends use of SCIP to provide secure voice through SCIP enabled terminals operating on a wide range of military and commercial networks e.g. PSTN, ISDN GSM, CDMA, Iridium SATCOM, IP etc. Obsolescent secure voice terminals should be replaced by SCIP equipment as necessary.

6 Prague, Czech Republic - September, 29-30, 2009 The NATO SVS identifies use of SCIP over heterogeneous networks - military and commercial, wired and wireless, circuit-switched and packet-transport. The strategy also identifies a number of steps to ensure future NATO telecommunication networks and network interfaces will support SCIP. This can be achieved by procuring future voice switches which will support V Voice over Secure IP In many areas, such as static headquarters or major deployed bases, NATO has established high capacity, resilient IP networks. These networks typically rely on a combination of physical security of the network infrastructure coupled with IP network encryption to protect all network traffic and signalling. Conventional VoIP telephones can be used on such a network to provide secure voice through voice over secure IP (VoSIP). This can be considered as a system high voice and data network where the voice is provided by insecure VoIP on a secure IP network. The NATO SVS recommends use of VoSIP to provide secure voice in headquarters and locations where a secure IP network is available to large numbers of users on a secure local area network (LAN) and where the majority of secure voice traffic is within the LAN. VoSIP service can be provided between secure LANs where there is a sufficient capacity, quality of service and security between the LANs. In future secure IP networks encryption of these inter-lan connections will be provided by the NATO IP network encryptor (NINE) which provides another common element to the solution. Secure voice requirements beyond NATO The two technical solutions, SCIP and VoSIP, between them are expected to accommodate virtually every current and future NATO requirement for secure voice. National secure voice requirements are expected to be similar. SCIP is capable of supporting NATO, coalition and national modes. Similarly, VoSIP is suitable for secure IP networks operating in a range of security domains. As a result, the SVS is capable of being extended to support the secure voice needs of nations as well as of the NATO Alliance. SCIP can also support operational modes with reduced security levels which are suitable for sharing with user communities outside the military. This capability allows military and civil actors to communicate in a trusted manner to facilitate information sharing, cooperation and collaboration. Secure voice interoperability to facilitate such interaction is necessary to enable a comprehensive approach, involving military and civil organisations in order to achieve the desired outcomes of many current and future NATO operations. FUTURE ARCHITECTURE Having proposed two different solutions to provide secure voice in order to meet the future needs, it is clear that gateways between SCIP and VoSIP will be necessary. These are likely to be located at the edge of VoSIP enclaves to allow secure voice users within the enclave to communicate securely with other users equipped with SCIP devices and vice versa. Figure 3 shows the envisaged future secure voice architecture based on SCIP terminals operating on a variety of networks. These networks support the requisite interfaces to allow SCIP calls to transit the full range of networks. SCIP-VoSIP gateways are located at the edge of VoSIP enclaves to provide secure voice interoperability between the two solutions. This reduces the gateway requirements to a single gateway family to operate between SCIP and VoSIP although there will be numerous locations where these gateways will be required.

7 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE Figure3. Future secure voice architecture Gateways to national secure voice systems Other gateways may be required to legacy NATO and national secure voice equipment families. The SCIP signalling and gateway specifications are capable of supporting these services as well as those required above. However as legacy systems will phase out in the future, less and less different gateways will be required CONCLUSIONS Secure voice, like many military requirements, is not an area where one size fits all. However by making sensible use of recent and developing technologies it is possible that two sizes fit virtually all. By adopting this approach NATO and Nations are able to benefit from cost-effective solutions to provide their secure voice requirements. This allows NATO to plan for the major steps needed to deliver these capabilities. The NATO secure voice strategy identifies over 40 specific recommendations which should be carried out within the short (0-3 years), medium (3-5 years) and long-term (5-10 years) timeframes. These recommendations are providing specific guidance to strategic commands and organisations within the NATO C3 structure. The recommendations are reflected in a number of technical initiatives and procurement plans.

8 Prague, Czech Republic - September, 29-30, 2009 The general guidance can be summarised in four high level recommendations of the secure voice strategy, which are to: halt procurement of any non-essential secure voice capabilities which are not consistent with the NATO secure voice strategy, to facilitate the deployment of NATO SCIP terminals and appropriate key management system to provide end to end secure voice; to enforce support for SCIP on the black communications infrastructure, to enable VoSIP for local secure voice services, to encourage the development and deployment of gateways from SCIP to VoSIP and national systems as required. ACKNOWLEDGEMENT The authors wish to thank the many colleagues within NATO and the Alliance who have contributed to the NATO secure voice strategy and without whom this paper would not have been possible. BIBLIOGRAPHY [1] NATO C3 Board, NATO Secure Voice Strategy v.1.0, AC/322-D(2009)0020-AS1, May 2009 [2] Blašková, L, Holub, J, Street, M, Szczucki, F and Tomíška O., Objective and subjective degradations of transcoded voice for heterogeneous radio network interoperability, RTO Tactical Communications symposium, Prague, Czech Republic, April [3] Street, M, Secure voice conferencing facility, Technical Note 1067, NATO C3 Agency, Netherlands, July [4] Street, M, Future NATO narrowband voice coder (STANAG 4591): selection process (phase two), Technical Note 913, NATO C3 Agency, Netherlands, July [5] Velasco, L. and Street, M, Performance of SCIP devices on public and classified heterogeneous networks, Military CIS Conference, Krakow, Poland, September [6] SCIP-216 Rev 2.0 Minimum Essential Requirements (MER) for V Gateways, SCIP International Interoperability Control Working Group, November 2007.

ABSTRACT. that it avoids the tolls charged by ordinary telephone service

ABSTRACT. that it avoids the tolls charged by ordinary telephone service ABSTRACT VoIP (voice over IP - that is, voice delivered using the Internet Protocol) is a term used in IP telephony for a set of facilities for managing the delivery of voice information using the Internet

More information

Secure Communications Interoperability Protocols (SCIP)

Secure Communications Interoperability Protocols (SCIP) John S. Collura NATO C3 Agency P.O. Box 174 2501 CD The Hague THE NETHERLANDS John.Collura@nc3a.nato.int ABSTRACT The concept of NATO Network Enabled Capabilities, (NNEC) including network-ready communications

More information

Ai-Chun Pang, Office Number: 417. Homework x 3 30% One mid-term exam (5/14) 40% One term project (proposal: 5/7) 30%

Ai-Chun Pang, Office Number: 417. Homework x 3 30% One mid-term exam (5/14) 40% One term project (proposal: 5/7) 30% IP Telephony Instructor Ai-Chun Pang, acpang@csie.ntu.edu.tw Office Number: 417 Textbook Carrier Grade Voice over IP, D. Collins, McGraw-Hill, Second Edition, 2003. Requirements Homework x 3 30% One mid-term

More information

NEXIUM THEATRE. Tactical networks for defence and security forces

NEXIUM THEATRE. Tactical networks for defence and security forces w w w. t h a l e s g r o u p. c o m NEXIUM THEATRE Tactical networks for defence and security forces DEFENCE SECURITY B ased on its long experience and worldwide leadership in military communications and

More information

Communications Transformations 2: Steps to Integrate SIP Trunk into the Enterprise

Communications Transformations 2: Steps to Integrate SIP Trunk into the Enterprise Communications Transformations 2: Steps to Integrate SIP Trunk into the Enterprise The Changing Landscape IP-based unified communications is widely deployed in enterprise networks, both for internal calling

More information

ZyXEL V120 Support Notes. ZyXEL V120. (V120 IP Attendant 1 Runtime License) Support Notes

ZyXEL V120 Support Notes. ZyXEL V120. (V120 IP Attendant 1 Runtime License) Support Notes ZyXEL V120 (V120 IP Attendant 1 Runtime License) Support Notes Version 1.00 April 2009 1 Contents Overview 1. Overview of V120 IP Attendant...3 2. Setting up the V120...4 3. Auto Provision...7 4. V120

More information

assuredcommunications Wireless RF-6750W RF-6710W

assuredcommunications Wireless  RF-6750W RF-6710W assuredcommunications Wireless E-mail RF-6750W RF-6710W Cutting-Edge Performance. Unmatched Capability. Harris email software runs on a wide variety of COTS PCs. Data communications Harris takes data communications

More information

Next Generation 112 ecall

Next Generation 112 ecall Next Generation 112 ecall ecall Final Event - Brussels 15 th May 2018 Harold Linke Luxembourg Agenda Introduction Next Generation ecall Migration Path Satellite and ecall Proof of Concept How ecall works

More information

Lecture 1 Overview - Data Communications, Data Networks, and the Internet

Lecture 1 Overview - Data Communications, Data Networks, and the Internet DATA AND COMPUTER COMMUNICATIONS Lecture 1 Overview - Data Communications, Data Networks, and the Internet Mei Yang Based on Lecture slides by William Stallings 1 OUTLINE Data Communications and Networking

More information

Chapter 7. Telecommunications, the Internet, and Wireless Technology

Chapter 7. Telecommunications, the Internet, and Wireless Technology Chapter 7 Telecommunications, the Internet, and Wireless Technology LEARNING OBJECTIVES What are the principal components of telecommunications networks and key networking technologies? What are the different

More information

ITU-APT Workshop on NGN Planning March 2007, Bangkok, Thailand

ITU-APT Workshop on NGN Planning March 2007, Bangkok, Thailand ITU-APT Workshop on NGN Planning 16 17 March 2007, Bangkok, Thailand 1/2 Riccardo Passerini, ITU-BDT 1 Question 19-1/2: Strategy for migration from existing to next-generation networks (NGN) for developing

More information

Virtual private networks

Virtual private networks Technical papers Virtual private networks Virtual private networks Virtual private networks (VPNs) offer low-cost, secure, dynamic access to private networks. Such access would otherwise only be possible

More information

TASMUS.

TASMUS. TASMUS www.aselsan.com.tr TACTICAL AREA COMMUNICATIONS SYSTEM TASMUS Tactical Area Communications System TASMUS, Tactical Area Communications System, is a network centric communication infrastructure that

More information

Secure information exchange

Secure information exchange www.thales.no Secure information exchange 2 together. Safer. everywhere. Whenever critical decisions need to be made, Thales has a role to play. In all its markets aerospace, space, ground transportation,

More information

Presents 2006 IMTC Forum ITU-T T Workshop

Presents 2006 IMTC Forum ITU-T T Workshop Presents 2006 IMTC Forum ITU-T T Workshop G.729EV: An 8-32 kbit/s scalable wideband speech and audio coder bitstream interoperable with G.729 Presented by Christophe Beaugeant On behalf of ETRI, France

More information

Public Switched TelephoneNetwork (PSTN) By Iqtidar Ali

Public Switched TelephoneNetwork (PSTN) By Iqtidar Ali Public Switched TelephoneNetwork (PSTN) By Iqtidar Ali Public Switched Telephone Network (PSTN) The term PSTN describes the various equipment and interconnecting facilities that provide phone service to

More information

TACOMS Post 2000 Interoperability in Communications

TACOMS Post 2000 Interoperability in Communications Krzysztof Lysek, PhD Military Communication Institute 05-130 Zegrze, Poland k.lysek@wil.waw.pl TACOMS POST 2000 PROJECT In NATO, interoperable communications standardization activities have taken many

More information

About Your SIP Service Solution

About Your SIP Service Solution whitepaper 5 Key Questions to Ask About Your SIP Service Solution By Gaetan Brichet, COO, Voxbone Voxbone US LLC - San Francisco Office 535 Voxbone Mission US St San 535 Mission Francisco, St CA San 94105

More information

ETSI TS V2.1.3 ( )

ETSI TS V2.1.3 ( ) TS 101 329-2 V2.1.3 (2002-01) Technical Specification Telecommunications and Internet Protocol Harmonization Over Networks (TIPHON) Release 3; End-to-end Quality of Service in TIPHON systems; Part 2: Definition

More information

Traditional PBX & Hosted VOIP Technology: The Key Differences & What They Mean For Your Business

Traditional PBX & Hosted VOIP Technology: The Key Differences & What They Mean For Your Business Traditional PBX & Hosted VOIP Technology: The Key Differences & What They Mean For Your Business CONTENTS Summary... 3 What s The Buzz About?... 3 What It Means For Businesses... 3 What It Means For Employees...

More information

TELECOMMUNICATION SYSTEMS

TELECOMMUNICATION SYSTEMS TELECOMMUNICATION SYSTEMS By Syed Bakhtawar Shah Abid Lecturer in Computer Science 1 Public Switched Telephone Network Structure The Local Loop Trunks and Multiplexing Switching 2 Network Structure Minimize

More information

Signaling System 7 (SS7) By : Ali Mustafa

Signaling System 7 (SS7) By : Ali Mustafa Signaling System 7 (SS7) By : Ali Mustafa Contents Types of Signaling SS7 Signaling SS7 Protocol Architecture SS7 Network Architecture Basic Call Setup SS7 Applications SS7/IP Inter-working VoIP Network

More information

User Services of TASMUS in the Digital Battlefield

User Services of TASMUS in the Digital Battlefield Şenol Uzun, Esra Çiftçibaşi Erkan ASELSAN Inc. Communications Division Ankara TURKEY E-mail: eciftcibasi@aselsan.com ABSTRACT Increasing demands on an extensive amount of digital data and information flows

More information

Transporting Voice by Using IP

Transporting Voice by Using IP Transporting Voice by Using IP National Chi Nan University Quincy Wu Email: solomon@ipv6.club.tw 1 Outline Introduction Voice over IP RTP & SIP Conclusion 2 Digital Circuit Technology Developed by telephone

More information

LTE : The Future of Mobile Broadband Technology

LTE : The Future of Mobile Broadband Technology LTE : The Future of Mobile Broadband Technology Erick Setiawan tukangbajaksawah@gmail.com 1 Become a necessity today, where the wireless broadband technology needed to meet increasing expectations in terms

More information

Chapter 11: Understanding the H.323 Standard

Chapter 11: Understanding the H.323 Standard Página 1 de 7 Chapter 11: Understanding the H.323 Standard This chapter contains information about the H.323 standard and its architecture, and discusses how Microsoft Windows NetMeeting supports H.323

More information

Introduction. H.323 Basics CHAPTER

Introduction. H.323 Basics CHAPTER CHAPTER 1 Last revised on: October 30, 2009 This chapter provides an overview of the standard and the video infrastructure components used to build an videoconferencing network. It describes the basics

More information

Introducing Unified Critical Communications

Introducing Unified Critical Communications Introducing Unified Critical Communications for Public Safety EXECUTIVE SUMMARY Public safety agencies already use a range of wireless communications networks, including Land Mobile Radio (LMR), public

More information

INSE 7110 Winter 2004 Value Added Services Engineering in Next Generation Networks Week #1. Roch H. Glitho- Ericsson/Concordia University

INSE 7110 Winter 2004 Value Added Services Engineering in Next Generation Networks Week #1. Roch H. Glitho- Ericsson/Concordia University INSE 7110 Winter 2004 Value Added Services Engineering in Next Generation Networks Week #1 1 Outline 1. Essentials of circuit switched telephony 2. Introduction to value added services 3. IN fundamental

More information

THE BUSINESS CASE FOR SIP

THE BUSINESS CASE FOR SIP THE BUSINESS CASE FOR SIP TIMES, THEY ARE A CHANGIN Over the past few decades, cultural and technological trends have dramatically transformed the workplace. Today, flexible working is a way of life. Employees

More information

NGN Presentation. Four buzzwords in the air 2/8/2015 2

NGN Presentation. Four buzzwords in the air 2/8/2015 2 NGN Presentation Four buzzwords in the air 2/8/2015 2 AGENDA What is current generation network Why Next Generation networks required What is NGN Basic Terms in NGN 2/8/2015 3 Current Scenario Today Separate

More information

System Manual Part 2: TetraNode Architecture

System Manual Part 2: TetraNode Architecture System Manual Part 2: TetraNode Architecture System Manual i Copyright 2009, Rohill Technologies B.V. Issue 1.00, June 2009 Information in this manual is subject to change without notice and does not represent

More information

MultiDSLA. Measuring Network Performance. Malden Electronics Ltd

MultiDSLA. Measuring Network Performance. Malden Electronics Ltd MultiDSLA Measuring Network Performance Malden Electronics Ltd The Business Case for Network Performance Measurement MultiDSLA is a highly scalable solution for the measurement of network speech transmission

More information

TCCA White Paper PPDR Roadmap for evolution from LMR/PMR to 4G/5G

TCCA White Paper PPDR Roadmap for evolution from LMR/PMR to 4G/5G Critical communications for all professional users Follow us on @TCCAcritcomms January 2019 TCCA White Paper PPDR Roadmap for evolution from LMR/PMR to 4G/5G Important Note The opinions and information

More information

SYNERGISTIC WARFARE COMMUNICATION SOLUTIONS

SYNERGISTIC WARFARE COMMUNICATION SOLUTIONS SYNERGISTIC WARFARE COMMUNICATION SOLUTIONS Tactical Communications & Networking Wireless / wired networks Full spectrum of tactical communications Tactical datalinks Radio ancillaries and accessories

More information

Module 3. Wide Area Networking (WAN)

Module 3. Wide Area Networking (WAN) Module 3 Wide Area Networking (WAN) When many nodes or LAN s are connected together in a large scale, we have a WAN. This may be world wide. Because of the separation of the nodes, the Public Data Network

More information

GUIDELINES FOR VOIP NETWORK PREREQUISITES

GUIDELINES FOR VOIP NETWORK PREREQUISITES GUIDELINES FOR VOIP NETWORK PREREQUISITES WHITE PAPER October 2016 Unified Networks Unified User Clients Unified Messaging Mobility 100+ Call Management Features Executive Summary This document contains

More information

Digital Speech Coding

Digital Speech Coding Digital Speech Processing David Tipper Associate Professor Graduate Program of Telecommunications and Networking University of Pittsburgh Telcom 2700/INFSCI 1072 Slides 7 http://www.sis.pitt.edu/~dtipper/tipper.html

More information

Digital Advisory Services Professional Service Description SIP IP Trunk with Field Trial for Legacy PBX Model

Digital Advisory Services Professional Service Description SIP IP Trunk with Field Trial for Legacy PBX Model Digital Advisory Services Professional Service Description SIP IP Trunk with Field Trial for Legacy PBX Model 1. Description of Services. 1.1 SIP IP Trunk with Field Trial for Legacy PBX Verizon will assist

More information

TACLINK. Tactical Communications System. Complete Communications Management System

TACLINK. Tactical Communications System. Complete Communications Management System TACLINK Tactical Communications System Complete Communications Management System TACLINK : Tactical Communications System Integration, Control, Adaptation and Routing Currently, the biggest challenge with

More information

Chapter 2 The 3G Mobile Communications

Chapter 2 The 3G Mobile Communications Chapter 2 The 3G Mobile Communications 2.1 The Vision for Third Generation (3G) Mobile Communication Systems: The vision for the emerging mobile and personal communication services for the new century

More information

IMT-2020 NETWORK HIGH LEVEL REQUIREMENTS, HOW AFRICAN COUNTRIES CAN COPE

IMT-2020 NETWORK HIGH LEVEL REQUIREMENTS, HOW AFRICAN COUNTRIES CAN COPE IMT-2020 NETWORK HIGH LEVEL REQUIREMENTS, HOW AFRICAN COUNTRIES CAN COPE Draft ITU-T Rec. Y.IMT2020-reqts Brice MURARA, ITU-T SG 13 Vice-chairman Agenda Background IMT Systems evolution towards 5G IMT-2020

More information

4G Mobile Communications

4G Mobile Communications 4G Mobile Communications Welcome to 4G The term 4G is used broadly to include several types of broadband wireless access communication systems, not only cellular telephone systems. One of the terms to

More information

Network Systems for Emerging WAN Applications

Network Systems for Emerging WAN Applications Network Systems for Emerging WAN Applications Hitachi Review Vol. 48 (1999), No. 4 169 Akihiko Takase, D.Sc. OVERVIEW: This paper describes wide-area-network architecture from the viewpoints of networking

More information

Ch.16 - Wireless WAN System Architectures

Ch.16 - Wireless WAN System Architectures Ch.16 - Wireless WAN System Architectures 1 Wireless WAN 2 GSM via PSTN 3 GSM via ISDN 4 GPRS 5 Mobitex 6 CDPD 7 PPDC 8 UMTS 9 Future Systems 10 Systems Summary 1 11 Systems Summary 2 1 This section will

More information

INTERNATIONAL INTERCONNECTION FORUM FOR SERVICES OVER IP. (i3 FORUM) Interoperability Test Plan for International Voice services

INTERNATIONAL INTERCONNECTION FORUM FOR SERVICES OVER IP. (i3 FORUM) Interoperability Test Plan for International Voice services INTERNATIONAL INTERCONNECTION FORUM FOR SERVICES OVER IP (i3 FORUM) Workstream Technical Aspects Workstream Operations Interoperability Test Plan for International Voice services (Release 3.0) May 2010

More information

RECOMMENDATION ITU-R F * Generic requirements for fixed wireless access systems

RECOMMENDATION ITU-R F * Generic requirements for fixed wireless access systems Rec. ITU-R F.1490-1 1 RECOMMENDATION ITU-R F.1490-1 * Generic requirements for fixed wireless access systems (Questions ITU-R 125/9 and ITU-R 215/8) (2000-2007) Introduction Today many technologies have

More information

Dominique Carrega, Emmanuel Fournier, Hervé Muyal (Tecsi).

Dominique Carrega, Emmanuel Fournier, Hervé Muyal (Tecsi). Project Number: Project Title: Deliverable Type: (K/N)* AC343 MOVE K CEC Deliverable Number: AC343 / TEC / WP1 / DS / K / 1 / Contractual Date of Delivery to the CEC: July 1998 Actual Date of Delivery

More information

DISN Evolution. TDM Elimination. Mr. Jessie L. Showers, JR., SES Infrastructure Executive (IE) 15 June 2017 UNITED IN SERVICE TO OUR NATION

DISN Evolution. TDM Elimination. Mr. Jessie L. Showers, JR., SES Infrastructure Executive (IE) 15 June 2017 UNITED IN SERVICE TO OUR NATION DISN Evolution TDM Elimination Mr. Jessie L. Showers, JR., SES Infrastructure Executive (IE) 15 June 2017 The IT Combat Support Agency RESOURCING ACQ/PROC DEV/TEST IMPLEMENTATION OPERATIONAL ENVIRONMENT

More information

DVB Interaction Channel through the Public switched Telecommunications System (PSTN) / Integrated Services Digital Network (ISDN)

DVB Interaction Channel through the Public switched Telecommunications System (PSTN) / Integrated Services Digital Network (ISDN) DVB Interaction Channel through the Public switched Telecommunications System (PSTN) / Integrated Services Digital Network (ISDN) DVB DOCUMENT A022 February 1997 Reproduction of the document in whole or

More information

E-Seminar. Voice over IP. Internet Technical Solution Seminar

E-Seminar. Voice over IP. Internet Technical Solution Seminar E-Seminar Voice over IP Internet Technical Solution Seminar Voice over IP Internet Technical Solution Seminar 3 Welcome 4 Objectives 5 Telephony in Business 6 VoIP and IP Telephony 7 Traditional Telephony

More information

Antelope Consulting FINAL, JULY Appendix K: Glossary

Antelope Consulting FINAL, JULY Appendix K: Glossary Antelope Consulting FINAL, JULY 2001 DFID Internet Costs Study Appendix K: Glossary TESSA N GROVES, 16 SEPTEMBER 2001 Admin Lease rate APEC APEC TEL Call Detail Record Circuit-switched, Circuit switching

More information

Internet Telephony. Definition. Overview. Topics. 1. Introduction

Internet Telephony. Definition. Overview. Topics. 1. Introduction Internet Telephony Definition Internet telephony refers to communications services voice, facsimile, and/or voice-messaging applications that are transported via the Internet, rather than the public switched

More information

Federated Mission Networking

Federated Mission Networking Federated Mission Networking Learning & Applying the Lessons John Palfreyman, IBM V4; 20 Mar 14 Agenda Future Mission Networking - Context Effective Coalitions through OPEN Integration Save money through

More information

Speech-Coding Techniques. Chapter 3

Speech-Coding Techniques. Chapter 3 Speech-Coding Techniques Chapter 3 Introduction Efficient speech-coding techniques Advantages for VoIP Digital streams of ones and zeros The lower the bandwidth, the lower the quality RTP payload types

More information

Transcoder Free Operation

Transcoder Free Operation GPP S.R00-0 Version.0 Version Date: March 00 0 Transcoder Free Operation 0 Stage Requirements COPYRIGHT NOTICE GPP and its Organizational Partners claim copyright in this document and individual Organizational

More information

INFORMATION EXCHANGE GATEWAYS: REFERENCE ARCHITECTURE

INFORMATION EXCHANGE GATEWAYS: REFERENCE ARCHITECTURE INFORMATION EXCHANGE GATEWAYS: REFERENCE ARCHITECTURE MAY 2017 A NEXOR WHITE PAPER NEXOR 2017 ALL RIGHTS RESERVED CONTENTS 3 4 5 6 7 8 11 12 13 14 15 INTRODUCTION IEG SCENARIOS REFERENCE ARCHITECTURE ARCHITECTURE

More information

Wireless Network Policy and Procedures Version 1.5 Dated November 27, 2002

Wireless Network Policy and Procedures Version 1.5 Dated November 27, 2002 Wireless Network Policy and Procedures Version 1.5 Dated November 27, 2002 Pace University reserves the right to amend or otherwise revise this document as may be necessary to reflect future changes made

More information

Chapter 5. Voice Network Concepts. Voice Network Concepts. Voice Communication Concepts and Technology

Chapter 5. Voice Network Concepts. Voice Network Concepts. Voice Communication Concepts and Technology Chapter 5 Voice Communication Concepts and Technology Voice Network Concepts Telephone switchboard - Circa 1898 Voice Network Concepts Telephone calls are connected from source via circuit switching. Circuit

More information

VOIP Network Pre-Requisites

VOIP Network Pre-Requisites VOIP Network Pre-Requisites Executive Summary This document contains basic network requirements that are foundational for good voice quality when using Vogtec VoIP products/solutions over a data network.

More information

Private Mobile Office creating mobility and improving contact ability in island environments

Private Mobile Office creating mobility and improving contact ability in island environments Private Mobile Office creating mobility and improving contact ability in island environments Contents Overview Business Requirements Target Customer Benefits of PMO v DECT Reseller Benefits Competitive

More information

Version 11

Version 11 The Big Challenges Networked and Electronic Media European Technology Platform The birth of a new sector www.nem-initiative.org Version 11 1. NEM IN THE WORLD The main objective of the Networked and Electronic

More information

AFCEA Welcome/Opening Keynote Speech. Murad Bayar, Undersecretary for Defense Industries, MoND, Turkey

AFCEA Welcome/Opening Keynote Speech. Murad Bayar, Undersecretary for Defense Industries, MoND, Turkey AFCEA Welcome/Opening Keynote Speech Murad Bayar, Undersecretary for Defense Industries, MoND, Turkey A Turkish Perspective on the Challenges of Security in a Network-Enabled Environment I would like to

More information

UBIQUITIOUS, RESILIENT, SECURE CONNECTIVITY IN THE NEAR-PEER THREAT ENVIRONMENT

UBIQUITIOUS, RESILIENT, SECURE CONNECTIVITY IN THE NEAR-PEER THREAT ENVIRONMENT 2018 Viasat White Paper August 27, 2018 UBIQUITIOUS, RESILIENT, SECURE CONNECTIVITY IN THE NEAR-PEER THREAT ENVIRONMENT With Hybrid Adaptive Networking By Craig Miller Vice President, Chief Technical Officer

More information

Portable Wireless Mesh Networks: Competitive Differentiation

Portable Wireless Mesh Networks: Competitive Differentiation Portable Wireless Mesh Networks: Competitive Differentiation Rajant Corporation s kinetic mesh networking solutions combine specialized command and control software with ruggedized, high-performance hardware.

More information

Synopsis of Basic VoIP Concepts

Synopsis of Basic VoIP Concepts APPENDIX B The Catalyst 4224 Access Gateway Switch (Catalyst 4224) provides Voice over IP (VoIP) gateway applications for a micro branch office. This chapter introduces some basic VoIP concepts. This chapter

More information

INTRODUCTION. BridgeWay. Headquarters

INTRODUCTION. BridgeWay. Headquarters MILITARY PRODUCTS INTRODUCTION Voiceboard Corporation s MediaPro products provide enhanced communications capabilities for military applications. State of the art technology, including redundant networking,

More information

NGN interconnection: technology challenges. Dr. Rochdi ZOUAKIA.

NGN interconnection: technology challenges. Dr. Rochdi ZOUAKIA. ITU/ Arab Regional Workshop on NGN interconnection: technology challenges Dr. Rochdi ZOUAKIA zouakia@anrt.net.ma TODAY We have different networks offering different services. Networks with Different architectures.

More information

Mission Critical MPLS in Utilities

Mission Critical MPLS in Utilities Mission Critical MPLS in Utilities The Technology to Support Evolving Networks Application Note February 2017 Mission Critical MPLS in Utilities The Technology to Support Evolving Networks Abstract This

More information

Overview of the Session Initiation Protocol

Overview of the Session Initiation Protocol CHAPTER 1 This chapter provides an overview of SIP. It includes the following sections: Introduction to SIP, page 1-1 Components of SIP, page 1-2 How SIP Works, page 1-3 SIP Versus H.323, page 1-8 Introduction

More information

The Migration to Ipv6

The Migration to Ipv6 GSM Europe The European interest group of the GSM Association http://gsmeurope.gsmworld.com The Migration to Ipv6 GSM Europe Policy Statement for the IPv6 Task Force- GSME, 6 August 2001 1. Background

More information

Wireless IP for IoT / M2M 101 The Basics

Wireless IP for IoT / M2M 101 The Basics Wireless IP for IoT / M2M 101 The Basics Aeris White Paper A concise introduction to using wireless devices for Internet of Things (IoT) and machine-to-machine (M2M) data transmissions. www.aeris.com 1

More information

Module 1. Introduction. Version 2, CSE IIT, Kharagpur

Module 1. Introduction. Version 2, CSE IIT, Kharagpur Module 1 Introduction Version 2, CSE IIT, Kharagpur Introduction In this module we shall highlight some of the basic aspects of computer networks in two lessons. In lesson 1.1 we shall start with the historical

More information

White paper NEXIUM Critical Services for EUFOR

White paper NEXIUM Critical Services for EUFOR w w w. t h a l e s g r o u p. c o m THE DOCUMENT IS FOR INTERNAL USE ONLY. ARCHITECT, INTEGRATOR AND OPERATOR OF SERVICE SOLUTIONS FOR DEFENCE AND SECURITY White paper NEXIUM Critical Services for EUFOR

More information

Thuraya NettedComms How to integrate different telecommunication technologies to manage disasters effectively

Thuraya NettedComms How to integrate different telecommunication technologies to manage disasters effectively Thuraya NettedComms How to integrate different telecommunication technologies to manage disasters effectively Geneva, October 7th, 2009 Dr Sven Rohte Chief Commercial Officer Page 0 Contents 1 2 3 Managing

More information

VoIP Core Technologies. Aarti Iyengar Apricot 2004

VoIP Core Technologies. Aarti Iyengar Apricot 2004 VoIP Core Technologies Aarti Iyengar Apricot 2004 Copyright 2004 Table Of Contents What is Internet Telephony or Voice over IP? VoIP Network Paradigms Key VoIP Protocols Call Control and Signaling protocols

More information

Approaches to Deploying VoIP Technology Instead of PSTN Case Study: Libyan Telephone Company to Facilitate the Internal Work between the Branches

Approaches to Deploying VoIP Technology Instead of PSTN Case Study: Libyan Telephone Company to Facilitate the Internal Work between the Branches Approaches to Deploying VoIP Technology Instead of PSTN Case Study: Libyan Telephone Company to Facilitate the Internal Work between the Branches Dr. Elmabruk M Laias * Department of Computer, Omar Al-mukhtar

More information

Abstract of the Book

Abstract of the Book Book Keywords IEEE 802.16, IEEE 802.16m, mobile WiMAX, 4G, IMT-Advanced, 3GPP LTE, 3GPP LTE-Advanced, Broadband Wireless, Wireless Communications, Cellular Systems, Network Architecture Abstract of the

More information

ITM542 Spring 2004 Feasibility Study of a Wireless LAN network With-VoIP at IIT Rice campus Ninad Narkhede Masaaki Yana Saturday, 1 May 2004

ITM542 Spring 2004 Feasibility Study of a Wireless LAN network With-VoIP at IIT Rice campus Ninad Narkhede Masaaki Yana Saturday, 1 May 2004 ITM542 Spring 2004 Feasibility Study of a Wireless LAN network With-VoIP at IIT Rice campus Ninad Narkhede Masaaki Yana Saturday, 1 May 2004 ABSTRACT Wireless technology has gained popularity in enterprises

More information

Digital Advisory Services Professional Service Description SIP Centralized IP Trunk with Field Trial Model

Digital Advisory Services Professional Service Description SIP Centralized IP Trunk with Field Trial Model Digital Advisory Services Professional Service Description SIP Centralized IP Trunk with Field Trial Model 1. Description of Services. 1.1 SIP Centralized IP Trunk with Field Trial Verizon will assist

More information

Voice over Internet Protocol

Voice over Internet Protocol Voice over Internet Protocol Voice over Internet Protocol Contents Introduction Benefits of Integrating Voice and Data Networks Converting Voice to Data Efficient and Reliable Network Infrastructures

More information

Microsoft Enterprise Voice and Online Services with Microsoft Lync Server 2013

Microsoft Enterprise Voice and Online Services with Microsoft Lync Server 2013 1800 ULEARN (853 276) www.ddls.com.au Microsoft 20337 - Enterprise Voice and Online Services with Microsoft Lync Server 2013 Length 5 days Price $4290.00 (inc GST) Version B Overview This five-day instructor-led

More information

Secure Military Messaging in a Network Enabled Environment

Secure Military Messaging in a Network Enabled Environment Secure Military Messaging in a Network Enabled Environment BGen.Murat ÜÇÜNCÜ Chief of IS Dept. Turkish General Staff 02.06.2010 1 IT HAS ALWAYS BEEN DIFFICULT TO BE THE LAST SPEAKER IN AN EVENT LIKE THIS.

More information

Setting up a National Transmission Plan & QoS for International Connections. Senior Engineer, TIS ETSI STQ Vice Chair Joachim POMY

Setting up a National Transmission Plan & QoS for International Connections. Senior Engineer, TIS ETSI STQ Vice Chair Joachim POMY Setting up a National Transmission Plan & QoS for International Connections Senior Engineer, TIS ETSI STQ Vice Chair Joachim POMY Outline Setting up a National Transmission Plan QoS for International Connections

More information

Managing Costs in Growing Networks with SEGway STPs and Point Code Emulation

Managing Costs in Growing Networks with SEGway STPs and Point Code Emulation Managing Costs in Growing Networks with SEGway STPs and Point Code Emulation Deb Brunner-Walker, Performance Technologies Technology White Paper www.pt.com Introduction Voice networks are evolving from

More information

This is a sample chapter of WebRTC: APIs and RTCWEB Protocols of the HTML5 Real-Time Web by Alan B. Johnston and Daniel C. Burnett.

This is a sample chapter of WebRTC: APIs and RTCWEB Protocols of the HTML5 Real-Time Web by Alan B. Johnston and Daniel C. Burnett. This is a sample chapter of WebRTC: APIs and RTCWEB Protocols of the HTML5 Real-Time Web by Alan B. Johnston and Daniel C. Burnett. For more information or to buy the paperback or ebook editions, visit

More information

Optical networking technology

Optical networking technology 1 Optical networking technology Technological advances in semiconductor products have essentially been the primary driver for the growth of networking that led to improvements and simplification in the

More information

Personal Handyphone Systems in Urban Infrastructure

Personal Handyphone Systems in Urban Infrastructure Personal Handyphone Systems in Urban Infrastructure Yukio Iino Mitsunobu Ootsuka Isao Shimbo ABSTRACT: The personal handyphone system (PHS) service began in Japan in 1995. As this new communication service

More information

COPYRIGHTED MATERIAL. Introduction. 1.1 Introduction

COPYRIGHTED MATERIAL. Introduction. 1.1 Introduction 1 Introduction 1.1 Introduction One of the most fascinating characteristics of humans is their capability to communicate ideas by means of speech. This capability is undoubtedly one of the facts that has

More information

2014 NASCIO Recognition Award Nomination

2014 NASCIO Recognition Award Nomination 2014 NASCIO Recognition Award Nomination TITLE: Network Communication Partnerships for Public Safety and Economic Opportunity CATEGORY: Cross Boundary Collaboration and Partnerships CONTACT: Shannon Barnes

More information

Mobile TeleSystems (MTS) Converges Fixed and Mobile Telephony

Mobile TeleSystems (MTS) Converges Fixed and Mobile Telephony Mobile TeleSystems (MTS) Converges Fixed and Mobile Telephony MTS creates new revenue opportunities with new services. EXECUTIVE SUMMARY Mobile TeleSystems (MTS) Industry: Telecommunications BUSINESS CHALLENGE

More information

Network Devices Introduction into Network Devices

Network Devices Introduction into Network Devices Network Devices Introduction into Network Devices Aims Gain a knowledge about network devices. Discuss what network devices are required to create a basic network Draw a bespoke network drawing using Visio

More information

Data and Computer Communications Chapter 1 Data Communications, Data Networks, and the Internet

Data and Computer Communications Chapter 1 Data Communications, Data Networks, and the Internet Data and Computer Communications Chapter 1 Data Communications, Data Networks, and the Internet Ninth Edition by William Stallings Data and Computer Communications, Ninth Edition by William Stallings,

More information

Your Secrets are Safe with Tiger

Your Secrets are Safe with Tiger Your Secrets are Safe with Tiger The more important the message, the greater the outside interest In today s fast moving and everchanging world, secure communications are key to the accomplishment of a

More information

Chapter 10: Wireless Networking. School of information science and Engineering, SDU

Chapter 10: Wireless Networking. School of information science and Engineering, SDU Chapter 10: Wireless Networking School of information science and Engineering, SDU 10.1 Introduction to Wireless Networks Requirement to the networks: Provides ubiquitous personal communications; Accommodate

More information

SECTION CORRECTION EFFECTIVE DATE

SECTION CORRECTION EFFECTIVE DATE Errata Sheet Changes to UCR 2008, Change 2 made by UCR 2008, Change 3 for Section 5.1, Requirements Categories and Language and 5.2, Customer Premise Equipment and Legacy Interfaces SECTION CORRECTION

More information

Introduction to Quality of Service

Introduction to Quality of Service Introduction to Quality of Service The use of IP as a foundation for converged networks has raised several issues for both enterprise IT departments and ISPs. IP and Ethernet are connectionless technologies

More information

Inmarsat Airborne ISR Solutions

Inmarsat Airborne ISR Solutions Solutions Inmarsat Airborne ISR Solutions Global Government Airborne ISR Solutions Mission First: Connectivity Always Intelligence, Surveillance and Reconnaissance (ISR) systems are integral to the ultimate

More information

Facilitator. Introduction to IT Networking for Facilities Managers. Class Logistics

Facilitator. Introduction to IT Networking for Facilities Managers. Class Logistics Introduction to IT Networking for Facilities Managers APPA Institute for Facilities Management Dallas, TX January 16, 2017 Facilitator J. Craig Klimczak, D.V.M., M.S. Chief Information Officer Community

More information

Satellite-Based Cellular Backhaul in the Era of LTE

Satellite-Based Cellular Backhaul in the Era of LTE Satellite-Based Cellular Backhaul in the Era of LTE Introduction 3 Essential Technologies for 3G/LTE Backhauling over Satellite 6 Gilat s Solution SkyEdge II-c Capricorn 7 Why Ultra-fast TDMA is the Only

More information