Metropolitan Broadband Networks: Design and Implementation Aspects, and Business Models

Metropolitan Broadband Networks: Design and Implementation Aspects, and Business Models

Antonios Alexiou (Research Academic Computer Technology & Institute and University of Patras, Greece), Christos Bouras (Research Academic Computer Technology & Institute and University of Patras, Greece), John Papagiannopoulos (University of Aegean, Greece) and Dimitrios Primpas (Research Academic Computer Technology Institute and University of Patras, Greece)
DOI: 10.4018/978-1-60566-148-3.ch019
OnDemand PDF Download:


This chapter presents the design principles that cover the implementation of broadband infrastructure in the region of Western Greece, by examining all the necessary parameters that arise while implementing such a critical developmental project. The broadband infrastructure that is deployed is either based on optical fiber (on big municipalities) or on wireless systems (OFDM based and WiFi cells). Furthermore, we present as two case studies all issues of the designing of the Metropolitan Area Network of Patras, the third largest city of Greece and the Wireless Access Network of Messatida. The major target of the broadband networks is to interconnect the buildings of the public sector in the city and also deploy infrastructure (fibers or wireless systems) that will create conditions of competition in providing both access and content services to the advantage of the end consumer. The usage of the broadband infrastructure by service providers will be based on the open availability of the infrastructure in a cost-effective way. Finally, we present the main characteristics of a proposed business plan that ensures financial viability of the broadband infrastructure and guarantees the administration, growth, and exploitation of infrastructure.
Chapter Preview

Broadband Status In Greece

The importance of broadband infrastructure worldwide is confirmed by the activities of certain advanced countries in order for the appropriate broadband infrastructure to be developed and adopted so as to contribute to economic growth and to tackle any possible cases of “technological exclusion” of citizens (Firth & Mellor, 2005).

The importance of broadband networks for the development of a country may also be confirmed by the intensiveness of the activities of many countries that set as their main strategic objective the implementation of such infrastructures. In addition, the development of such networks has also been adopted in the common European policy for the implementation of the Information Society. In eEurope 2005 as well as in i2010, broadband access is an important priority of the European Union (EC, 2002; Europa, 2004).

In the current situation, the proper infrastructure in Greece is owned only by the former public telecommunications provider (OTE), while the alternative providers seem only to have plans in expanding their network infrastructure within the big cities of Greece. The business plans of the alternative telecommunications companies and network carriers do not include the expansion of their network throughout Greece, since they are afraid that non-urban areas do not appear to have any business interest. Broadband access, as defined by the “Strategic Text on Broadband Access” of the relevant task force, requires the proper broadband infrastructure and the competition between the Internet service providers. Since broadband infrastructure is now being developed, the penetration of broadband usage has not been increased. Although these findings are pessimistic regarding the growth of broadband, the action line of the operational program “Information Society” appear to be a significant hope for the near future.

Complete Chapter List

Search this Book:
Editorial Advisory Board
Table of Contents
Indranil Bose
Chapter 1
Varadharajan Sridhar
Telecom operators have a wide variety of functions to perform including marketing of telecom products and services, managing their networks... Sample PDF
Strategic Outsourcing: Opportunities and Challenges for Telecom Operators
Chapter 2
Sami J. Habib
This article presents a computer-aided integration tool, iCAD, that can predict a network evolution. We have used the term a network evolution to... Sample PDF
Empirical Prediction of Computer-Network Evolution
Chapter 3
Hak Ju Kim
This article seeks to develop a richer understanding of the suitability of IP telephony in the Public Switched Telephony Network (PSTN) with an... Sample PDF
Suitability of IP Telephony in the Public Switched Telephone Network (PSTN): A Case Study
Chapter 4
Abid Al Ajeeli
This chapter describes a detailed framework configuration infrastructure design for a high performance network. The configuration is described based... Sample PDF
A Framework for High-Speed Networking
Chapter 5
Nurul I. Sarkar, Catherine Byrne, Nabeel A.Y. Al-Qirim
Ethernet network technology is still one of the most popular LAN technologies in use today by many organizations and educational institutions... Sample PDF
Updating on Gigabit Ethernet Implementation: The Case of a Large New Zealand Organization
Chapter 6
M. Chandrasekaran, R. S.D. Wahida Banu
This chapter introduces and analyses a class of non-linear congestion control algorithms called polynomial congestion control algorithms. These... Sample PDF
Interaction Between MIMD-Poly & PIPD-Poly Algorithms and other TCP Variants in Multiple Bottleneck TCP Networks
Chapter 7
Xabiel G. Pañeda
This chapter presents a method for performance analysis and configuration of audio/video-on-demand services. These kind of services makes use of an... Sample PDF
A Systematic Approach to the Analysis and Configuration of Audio/Video-on-Demand Services
Chapter 8
Say Ying Lim
As more and more servers appearing in the wireless environment provide accesses to mobile users, more and more demand and expectation is required by... Sample PDF
Mobile Information Processing Involving Multiple Non-Collaborative Sources
Chapter 9
Vilmos Simon
In the next generation IP-based mobile networks, one of the most important QoS parameters are the delay and the delay variation. The cell handover... Sample PDF
Network Planning Algorithms for Optimizing Signalling Load in Mobile Networks
Chapter 10
Joon-Yeoul Oh, John P. Mullen
This chapter proposes a very effective heuristic algorithm to address a variation of the cellular network expansion problem and discusses each... Sample PDF
A Heuristic Solution to the Large Scale Cellular Telecommunication Network Expansion Problem
Chapter 11
Manuel Vilas
This article introduces a distributed system, called wireless proxy, to mitigate the effects of user mobility over streaming services on IEEE 802.11... Sample PDF
Wireless Proxy: Distributed System to Mitigate the Effects of User Mobility Over Streaming Services on IEEE 802.11 Wireless LANs
Chapter 12
R. Radhakrishnan, K. R. Shankarkumar, A. Ebenezer Jeyakumar
In this chapter, we propose a new scheme for Multi User Detection (MUD) using Parallel Interference Cancellation (PIC) technique. This technique... Sample PDF
Soft Decision Parallel Interference Cancellation for Multi-Carrier DS-CDMA
Chapter 13
Ghassan Kbar
This chapter introduces a new radio resource management technique based on distributed dynamic channel assignment, and sharing load among Access... Sample PDF
Distributed Resources Management in Wireless LANs that Support Fault Tolerance
Chapter 14
Mieso K. Denko
This article proposes a cooperative data caching and prefetching scheme for Mobile Ad Hoc Networks (MANETs). In this scheme, multiple hosts... Sample PDF
Cooperative Data Caching and Prefetching in Wireless Ad Hoc Networks
Chapter 15
Essam Natsheh
The challenge in creating a routing protocol for ad-hoc networks is to design a single protocol that can adapt to the wide variety of conditions... Sample PDF
A Survey on Fuzzy Reasoning Applications for Routing Protocols in Wireless Ad-Hoc Networks
Chapter 16
Essam Natsheh
Mobile ad-hoc network is a network without infrastructure, where every node has its own protocols and services for powerful cooperation in the... Sample PDF
Fuzzy Linguistic Knowledge for Active Queue Management in Wireless Ad-Hoc Networks
Chapter 17
Yun Wang, Lee Seidman
The use of network traffic audit data for retrieving anomaly intrusion information and profiling user behavior has been studied previously, but the... Sample PDF
Risk Factors to Retrieve Anomaly Intrusion Information and Profile User Behavior
Chapter 18
Rania Wehbi
In Inter-Vehicle Communication (IVC) networks, the high mobility and lack of infrastructure pose major challenges in designing secure routing... Sample PDF
Network Setup for Secure Routing in Inter-Vehicle Communication Networks
Chapter 19
Antonios Alexiou, Christos Bouras, John Papagiannopoulos, Dimitrios Primpas
This chapter presents the design principles that cover the implementation of broadband infrastructure in the region of Western Greece, by examining... Sample PDF
Metropolitan Broadband Networks: Design and Implementation Aspects, and Business Models
About the Contributors