Feeds

Amsterdam internet hub gets ready for 4G mobile VoIP

AMS-IX now offering guaranteed IP links

Secure remote control for conventional and virtual desktops

The Amsterdam Internet Exchange will soon offer Service Level Agreements (SLAs) across its infrastructure - providing the guaranteed bandwidth needed if IP is going to conquer the world.

AMS-IX, as the public peering hub is known, already provides public peering between internet companies, but from 1 July the hub will be able to link companies together with guaranteed SLAs rather than the best-effort offerings available today. That’s increasingly important as companies move critical infrastructure - such as fourth-generation mobile telephony - onto IP networks.

Mobile network operators already have IP connections with each other, but aren’t yet big producers of IP content - smartphones might consume data but they don’t produce much of it yet. That will change with 4G networks, which use IP packets for everything, including voice calls; so mobile operators are going to start generating huge quantities of IP data to be consumed by other mobile, and fixed, operators.

Also launched on Wednesday was AMS-IX Inter-IPX (IP Packet Exchange) service, a connection aimed specifically at mobile network operators conforming to quality-of-service standards laid down by the GSMA.

Customer packets won't start transiting the new network until next month, but operators such as Turk Telekom and Japan’s SoftBank came out at the launch to say how they'll be using the new exchange - boosting Istanbul as an international hub, and providing a short cut to Japan (avoiding the USA) for SoftBank.

Companies reliant on quality of their data connections have hitherto relied on their own infrastructure: maintaining separate peering arrangements (and infrastructure) with their partners. Many will feel the need to continue doing so, at least until the Amsterdam operation has had a chance to prove its resilience and capacity.

But 4G mobile operators are going to be generating IP data in unprecedented quantities and with high quality of service requirements, so the Amsterdam Exchange is hoping to be ready to handle that traffic when it arrives. ®

Security for virtualized datacentres

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
'Serious flaws in the Vertigan report' says broadband boffin
Report 'fails reality test' , is 'simply wrong' and offers ''convenient' justification for FTTN says Rod Tucker
This flashlight app requires: Your contacts list, identity, access to your camera...
Who us, dodgy? Vast majority of mobile apps fail privacy test
Apple Watch will CONQUER smartwatch world – analysts
After Applelocalypse, other wristputers will get stuck in
Shades of Mannesmann: Vodafone should buy T-Mobile US
Biting the bullet would let Blighty-based biz flip the bird at AT&T
Drag queens: Oh, don't be so bitchy, Facebook! Let us use our stage names
Handbags at dawn over free content ad network's ID policy
Blockbuster book lays out the first 20 years of the Smartphone Wars
Symbian's David Wood bares all. Not for the faint hearted
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.