Posted by: aviatnetworks | November 5, 2014

The Shellshock IT Vulnerability in Relation to Microwave Radio

Since the beginning of October 2014, there has been a lot of coverage in the technology press concerning the so-called “Shellshock” or “Bash Bug” computer vulnerability. All the coverage has been exclusively related to general IT and computer systems. But how does this vulnerability concern microwave radio systems? Take our poll and let us know what you know.

 

Aviat Networks recently completed an exhaustive internal review of all our current and legacy products and found no inherent weaknesses in any of the systems toward Shellshock. We have recently informed our customers of this end result (see statement).

Posted by: aviatnetworks | September 30, 2014

Mt. Otto: 11,000-foot Microwave Site Install in Papua New Guinea

Aviat Networks and its partners Kordia and Eltek installed an entirely off-the-grid microwave repeater and spur atop 11,000-foot Mt. Otto in Papua New Guinea.

Aviat Networks installed an entirely off-the-grid microwave repeater and spur atop 11,000-foot Mt. Otto in Papua New Guinea. Image credit: Shutterstock

In all its years, Aviat Networks has installed a great many microwave radios and in some very interesting places. On the sides of the largest dams. On top of the most famous bridges. Deep in the Aboriginal Outback. Way out to sea. In the frozen wastes of the Great White North.

Our latest triumph of man and mechanism over elements comes by way of Papua New Guinea, one of the last lands to be touched by the progress of high technology.

Deep in the heart of this primordial island nation, an imposing mountain stands: Mt. Otto, nearly 11,000 feet (3500m) of steep slopes and very little summit. Few people climb it. There are virtually no roads of which to speak. The only practical way to bring wireless telecom gear up is via helicopter.

However, Aviat Networks was equal to the challenge. Aviat’s services department is loaded with can-do problem-solvers keen to tackle projects like this. In this case, a critical issue for the Mt. Otto site revolved around power. Issue resolved with a big Eltek generator, part of an amazing energy solution that powers an Aviat WTM 6000 14+2 repeater with a 7+1 spur—all built to run at Mt. Otto’s high altitude without supervision for extended periods. If we look a bit closer at the site specs, we will see:

  • 2 x WTM 6000 15+0 Ethernet with 1+1 SDH (design capacity of 3Gbps; normal operation close to 4Gbps)
  • 1 x WTM 6000 6+0 Ethernet with 1+1 SDH (design capacity of 1.5Gbps normal operation; close to 2Gbps)
  • 12 foot antennas in a Space Diversity configuration across a 91km path
  • 8- and 10-foot antennas to other spur sites

Heady stuff.

To keep the site online, an array of 96 solar panels powers the microwave radios with 24 kW of electricity. As backup, the 80KVA Eltek generator provides up of five days of continuous current in case of extended cloudy weather. It is capable of this as it runs on fuel that’s kept warm in a modular container. Otherwise the fuel would freeze solid in the thin mountain air. A large battery installation provides an extra five days of backup power. Those same solar panels top off the charge on these 57,000 pounds (25,704 kg) of batteries. It’s a closed system completely designed for 100 percent off-the-grid operation.

To complete the site, required dozens of sorties airlifting personnel and all the material necessary to build and install the site. Overall, the Mt. Otto site is an amazing accomplishment in a super remote and hard-to-get-to place.

Posted by: aviatnetworks | September 13, 2014

Heavy Reading Finds Growth for MNOs in Enterprise Services

Heavy-Reading-logoRecently, telecom research firm Heavy Reading conducted a survey of mobile network operators (MNOs) from the around the world exclusively for Aviat Networks. The goal of the survey was simple: determine the sentiment of MNOs to provide fixed wireless services to enterprise customers.

Now that the growth rate of individual wireless subscribers has leveled off in many nations with mobile penetration rates near and even exceeding 100 percent, MNOs have begun to look very seriously at alternate sources of revenue growth. And one of those alternatives is fixed wireless enterprise services, which according to Heavy Reading, MNOs rank as a co-strategic priority along with their core subscriber business.

Infographic of Heavy Reading Aviat Networks survey results of Mobile Networks Operators indicates they will offer fixed wireless enterprise services for revenue growth.

MNO Enterprise Services survey results infographic. Click to enlarge.

Enterprise services are all very well and good but how does an MNO deliver them? The answer is not as complex as you may imagine but somewhat more difficult in reality. While MNOs have robust infrastructure based on rock-solid microwave backhaul technology to the cell sites at the edges of their networks in the majority of cases, they do not have an easily deployable method of supporting fixed wireless services to enterprises. One such way would be via Layer 3. In the survey, Heavy Reading found that a supermajority, or 70 percent, of MNOs believe that Layer 3 (L3) capability from the cell site is “critical” or “very important” to enable new service delivery.

However, L3 capabilities are not the end of the story. Layer 3 services are packet-based and require IP/MPLS routing functionality in order to operate. Accordingly, the MNOs surveyed by Heavy Reading reflect this outlook by an overwhelming 75 percent stating that IP/MPLS is “critical” or “very important” for offering fixed wireless services to enterprises. In addition, 75 percent of MNOs also believe it is “critical” or “very important” that existing cell site equipment be made capable of delivering these fixed wireless enterprise services. The existing cell site equipment is quite capable of delivering Layer 2 (L2) fixed wireless services, but help is needed to go the next step up to L3.

“Whilst L2 can be used to deliver business services, our survey results suggests that most mobile operators are very interested in the additional benefits of L3 including MPLS,” says Patrick Donegan, senior analyst, Heavy Reading. “They also tend to value very highly the ability to deliver those business services from existing equipment at their cell sites.”

Donegan goes on to elaborate further in the complete survey results where he reveals more eye-opening insights. To find out these and more click here.

Posted by: aviatnetworks | August 7, 2014

We Put the Spotlight on Voice Over LTE (VoLTE)

As one of the most anticipated network technologies, Voice over LTE (VoLTE) has been discussed by operators for years. The expectation was that deployments would start in 2013, but roll-outs in North America were delayed.

VoLTE Logo

Logo courtesy of YTD2525 Blog

Operators have faced a series of issues that include poor voice quality and long call establishment times. Once these problems are solved, it is expected that VoLTE will allow operators to provide  voice and data services using an integrated packet network. As the problems described show, the implementation of VoLTE presents challenges for the entire LTE ecosystem including microwave backhaul.

We have produced a white paper to describe some of the VoLTE requirements that must be met in order to overcome these technical challenges, which must encompass a flexible microwave backhaul as a key factor for a successful transition to all-packet voice and video VoLTE  networks. A brief introduction to VoLTE is presented and then different VoLTE backhaul requirements are described with possible solutions.

Click here to download a white paper on this subject titled “VoLTE and the IP/MPLS Cell Site Evolution”.

Posted by: aviatnetworks | June 25, 2014

FIPS: What is it? Why is it Important?

Aviat-Networks-says-FIPS-140-2-Level-2-validation-is-important-to-protect-microwave-radio-payload+management-traffic-June-25-2014

FIPS 140-2 Level 2 validation is important to protect microwave radio payload and management traffic from interception and hacking. Photo credit: Stephen Little / Foter / Creative Commons Attribution-NonCommercial 2.0 Generic (CC BY-NC 2.0)

FIPS stands for Federal Information Processing Standards, a set of computer security standards established by the US federal Department of Commerce’s National Institute of Standards and Technology (NIST). The goal of FIPS is to create a uniform level of security for all federal agencies in order to protect sensitive but unclassified information—a large portion of the electronic data not considered secret or higher.

Of most interest to microwave backhaul users are two particular FIPS standards, FIPS 197 and FIPS 140-2. FIPS 197 is straightforward enough: it provides the definition of the Advanced Encryption Standard (AES), which is the basis of so much of the security industry. Many security products from IT vendors are validated FIPS 197 through an organization within NIST called the Cryptographic Module Validation Program (CMVP) that reviews and verifies the testing results of independent labs that put participating company’s cryptographic modules through their paces.

It still begs the question, “Why is FIPS important?” The answer is simple. Rather than take your telecom vendor’s word that its products are secure and will properly protect your payload and network management traffic, FIPS is an assurance backed by the full faith of the United States government that FIPS-validated security solutions defend your electronic information thoroughly within the context of how the solutions were designed and manufactured.

However, not all FIPS validations are created equal. FIPS 140-2 that sets the standard for the Security Requirements for Cryptographic Modules has different levels of validation. For example, a cryptographic module that is validated FIPS 140-2 Level 1 provides that basic level of security by encrypting data going through it to the level of protection provided by AES. However, a cryptographic module that is validated to FIPS 140-2 Level 2 not only provides AES electronic encryption but also physical security of the device itself. This means that a FIPS 140-2 Level 2 validated cryptographic module cannot be tampered with unless the seals on the solution housing are broken in which circumstance the so-called cryptographic officer will know immediately information security has been compromised and she can the take action at once to remediate any data breach.

FIPS 140-2 validated cryptographic modules are required by law for all US federal agencies that handle sensitive but unclassified information. And other industry verticals are making FIPS 140-2 Level 2 a nonnegotiable item for their backhaul security including financials, healthcare industry, legal services, mobile operators and public safety.

Face it: We live in a more and more insecure world. Whether you are a common carrier, a first responder agency or a multi-site hospital system, your customers have been hyper-sensitized about security and expect you do to everything possible to protect theirs. If you don’t have FIPS-validated security on your backhaul now, they may force it on you later. Get ahead of the curve and look into implementing FIPS solutions today.

For more information on FIPS, download the Aviat Networks primer on FIPS.

Older Posts »

Categories

Follow

Get every new post delivered to your Inbox.

Join 288 other followers

%d bloggers like this: