Tag: setup issues

What can be done to support FTTH independent install

What is independent install

Fibre-optic connection pots in ground - press picture courtesy of Gigaclear

As more fibre-to-the-premises connections become ubiquitous, there will be a call towards independent-install as a service provisioning option in order to save costs for subsequent FTTP deployments

Independent installation of fibre-to-the-home / fibre-to-the-premises broadband Internet is where the installation and provisioning of this service doesn’t require a technician employed or contracted by the infrastructure provider or ISP to come to your premises.

Most likely these kind of FTTH / FTTP installations will take place in an environment where the consumer owns the optical network terminal and can replace it with equipment that suits their needs better. As well, such equipment will be typically in the form of desktop equipment that is the size of a typical home-network router.

Independent install approaches have been seen to be successful with ADSL and cable broadband Internet due to the copper infrastructure being ubiquitous in most households. In a lot of cases, this has allowed ISPs and telcos to offer cheaper broadband Internet to the masses.

New connections

A new connection to a premises that hasn’t been previously connected would require a technician employed or contracted by the infrastructure provider or ISP to run a connection from the street to the building or premises. They would be required to install a “demarcation point” on the premises where the infrastructure provider’s legal responsibility ends as far as the infrastructure goes.

Some ISPs or infrastructure providers may supply and install the fibre-optic cabling from the demarcation point to a wall socket close to where you are to have your optical network terminal and home-network router. Here, this would be part of the installation cost for a new connection to an existing premises.

On the other hand, an independent third-party installer with fibre-optic skills would install fibre-optic runs as part of electrical / AV / data cabling during the construction of a new building or full-on renovation. This would be paid for by the building owner as part of the project costs.

As well, there will be pressure on building developers to install the necessary infrastructure for fibre-to-the-premises Internet as a standard offering. This will be exerted by customers, urban planners, regulatory authorities, competing developers and the like to have that project set up for today’s online expectations. In this case, electricians engaged by the developers will be required to be skilled in FTTP fibre-optic installations.

Existing connections

Connections on AVM FritzBox FF30 Fiber router image courtesy of AVM

The AVM Fritz!Box 5530 is one of these home-network routers with a connection for fibre-optic internet in the form of an SFP plug.

As fibre-to-the-premises broadband takes hold, there will be more of the existing connections to this kind of infrastructure. This will be where independent install will earn its keep. It will also include premises that are part of a previously-mentioned building development that have been wired for fibre-to-the-premises.

Self-install, including wires-only / BYO setups

Self-install is where there is cabling to the premises and a wall socket installed therein. The customer picks up the equipment they need and, perhaps, a flylead or adaptor from the ISP’s bricks-and-mortar presence or a retailer. Or this equipment is delivered to the customer’s premises by post or courier.

Then the customer unpacks the equipment and installs it themselves. They may find that the ISP or infrastructure provider has to remotely activate the equipment and set it up for the Internet service.

If the arrangement is described as a BYO or wires-only setup, the equipment isn’t bundled with the service. Rather the customer buys the equipment from the ISP or infrastructure provider or a technology retailer. They can take the equipment between premises rather than leaving it behind when they move.

The BYO or wires-only setup would be pushed for in the name of competition and innovation. This is due to the idea of offering higher-performance ONT modems or ONT/router combo equipment a.k.a. fibre-optic gateways that is equivalent to modem routers. As well, it would be pushed as a lower-cost service-provisioning option due to the ISP or telco not needing to have customer-premises equipment on their books as a rapidly-depreciating asset including the cost to warehouse the equipment, nor needing to have technicians drive to the customer’s premises to deliver or install the equipment.

Should the equipment fail, the customer would have to disconnect the equipment and organise to have it repaired. Here, they would send the equipment to the ISP or infrastructure provider if it is bundled with the service. Or they would send it to a repairer if the equipment isn’t bundled, such as a BYO equipment deal. The same situation also applies where a technical upgrade is taking place and the customer needs to use newer equipment.

Similarly, self-install especially BYO / wires-only setup may permit a customer to take the equipment with them when they move to premises where there is already the FTTP infrastructure therein. This would appeal with people who purchase ONT modems or ONT/router units that are about higher performance.

Independent technician install

An independent-technician install relies on a suitably-trained technician engaged by the customer to install the fibre-optic wiring between the demarcation point and where they want to install their equipment.

Such technicians would be able to move the fibre-optic connection on the customer’s side of the demarcation point if you had to reposition it to a newer location. The technician would also be able to do repairs on the fibre-optic cabling if it failed or was damaged.

If you are renovating your home or working on a new-build premises, having an electrician or AV technician who is skilled with fibre-optic handling will come in to its own. Here, you have the same tradesperson doing the fibre-optic cabling as well as other copper-based cabling runs, whether AC wiring, RF for a TV aerial or master-antenna TV setup, AV for multiroom audio and video or Ethernet cabling for your home network.

What is needed

Demarcation point

The fibre-to-the-premises installation has to have a distinct demarcation point at the user’s premises. This delineates the point of responsibility between the service/infrastructure provider and the premises owner/occupier as far as the fibre-optic infrastructure is concerned.

This would have to designed so that a skilled independent technician can connect a fibre-optic installation to this point when they have installed it. It could be feasible to have this support a “multi-fibre” connection with a “mutual / independent / open” demarcation point for environments that support infrastructure-level competition, something that is already established in France. That is where multiple street-side fibre connections are connected to this point and a technician engaged by the service provider the user is contracting with switches the user to that infrastructure.

Of course a consumer may want wall points for two or more infrastructure-level fibre connections. This would be called upon by businesses, for example, who subscribe to service providers on different infrastructures for increased fault tolerance of their Internet connection. In these cases, there would be two or more of the demarcation points on the premises in addition to two or more wall points or one multi-fibre demarcation point is used to serve two different outlets with connections to different infrastructure providers.

Multiple-premises buildings like apartment blocks or shopping centres may have the demarcation point in the telecommunications equipment room, typically in the basement or on the ground floor. This may be held as the building demarcation point while the cabling is maintained by technicians appointed by the building committee or owner. Some setups may then require a second demarcation point per premises with this being installed in a cupboard therein. In that area, cabling to the wall socket may be serviced by a technician engaged by the premises owner or occupier.

To assure access to infrastructure-level competition, there may be the idea of having multi-fibre connectivity to each premises with the premises-level demarcation point being where a household is switched between competing infrastructure providers.

Wall point

As well, there would be a requirement to have a fibre-optic wall point so that customers can easily connect and disconnect their optical network terminal. This would make self-install or “BYO device” arrangements work properly because the customer would have to be able to easily connect equipment that they supply.

Such wall points would be required to be installed where the customer wants their equipment placed. There will be instances where a customer wants two or more wall points that are connected to different fibre-optic infrastructure providers so as to provide a fault-tolerant setup.

Rugged flylead with rugged plugs

Then there would be the need for a rugged flylead with rugged plugs that the customer uses to connect between an optical network terminal (fibre optic modem) and the wall point.

Such cables and plugs would be about being able to be connected and disconnected easily by anyone and not being at risk of damage. It may also be about having these cables offered at lengths that suit the customer’s needs. These would be supplied through retail outlets, packaged with the ONT equipment or supplied by the installer. Most likely this will be in the form of the Single Form Pluggable connection on the equipment side like with the AVM Fritz!Box 5530 advanced home network router.

Why independent install

Having independent install as part of a fibre-to-the-premises setup for home and small-business users would become an economical measure for infrastructure providers. This makes a lot of sense with existing installations where a premises has FTTH / FTTP cabling to the point where a user wants to set up their network equipment.

Here, a technician doesn’t need to come out, supply and install an ONT modem in the premises; avoiding the need for the customer to book an appointment and make sure a responsible adult is waiting around to welcome and supervise the installer.

It would also permit the customer to choose their own kind of FTTP optical-network-terminal equipment. This is more so where the ONT equipment is part of a router and there is the desire to offer innovative better-performing equipment that has functionality that is desired by the customer. As well, manufacturers are encouraged to design smaller desktop units that fit in with the customer’s premises.

This also applies to installation modifications where a customer engages a trained technician to do the job. For example, the customer could engage an electrician who has been trained for AV, telecommunications and other similar work to do any “customer-side” work like moving their equipment or even to wire up a new building or premises.

The role of the infrastructure-supplier’s technicians would be reduced so as to “pull” the fibre-optic cabling from the street to the network demarcation point on the building and maintain that connection. As well, in an environment where there is competing infrastructure providers, the technicians supplied by the competing provider can know where to connect in their cabling to the building’s cabling infrastructure.

The disadvantage associated with independent install for FTTH setups is that the infrastructure provider would lose quality control over the installation. This may not necessarily apply to a self-install arrangement where the goal is to connect customer-supplied equipment to existing connections. But it would apply where new fibre-optic cabling is installed or an existing fibre-optic cabling installation is modified by a third-party technician.

Conclusion

As more countries take on fibre-to-the-premises broadband Internet, there will be the question about making sure that independent installation options are part of the course. This is more so as more premises become wired up to FTTP and the prospect of self-install where customers install replacement or improved equipment themselves becomes appealing as a way for operators to save money.

Connected novelties and toys–security and useability issues that affect this product class

Giftware chook (rooster)

Connected versions of classic novelties and giftware will be subject to severe scrutiny

An issue that is rearing its ugly head is the rise in availability of connected novelties and toys. They are toys, novelties, giftware, seasonal decorations and other items that are able to connect with your computer or network. This connectivity function is often sold as one of the key marketing features with it able to work with an online service of some sort.

When I talk of toys, I don’t just talk of what children play with with but also other toys that adults end up playing with. These can include the so-called “executive toys” that live on the office desk for one to keep the other hand busy while they are on the phone.

Who typically sells these products

Toys and novelties are typically sold through a large range of online and bricks-and-mortar retailers, whether they be toy stores, gift stores, souvenir outlets or multi-facet outlets including department and discount stores. In some cases such as rural areas, a store like a newsagent’s could even sell novelties or toys.

Another factor is that novelties are given away to people and businesses as a gift or premium. This can typically happen as part of a “loot bag” offered out at conferences or tradeshows or simply used as a giveaway during a presentation to encourage audience participation.

Christmas wreath

Seasonal decorations that connect to the Internet can also be a security or setup risk

The common factor here is that most of the outlets that sell this kind of product are staffed by people who don’t have much technological know-how. This can affect the procurement process affecting whether the item exhibited at the gift fair should be stocked, or providing customer advice during and after the sale including how to get the connected novelty fully operational.

Artisans who make these gifts and novelties

Amazon Echo on kitchen bench press photo courtesy of Amazon USA

Your Amazon Echo will soon be expected to work with a wide range of toys and novelties

There is also the fact that craftspeople like to make various toys, novelties, gifts and other items and sell them directly to customers or on a wholesale basis. But they do want to add some extra functionality like musicality or flashing lights to some of their product lines.

Typically, if they want this extra functionality in these gifts that they make, they have someone else make and supply the necessary components like clockwork movements or electronic-circuit kits to fulfil the extra functionality in a pre-assembled form.  Then the artisan installs the pre-assembled mechanisms or circuits in the toy or gift as part of putting the whole thing together.

It allowed these artisans to focus on their craftwork and build the items they want to sell, while being able to offer a wide range of goods. The same comments that apply to finished goods also apply to the various components and kits that are being sold to these artisans for their projects.

In this case, the artisans have to be aware of what they procure when they are being sold a “connected functionality” kit for installation in their projects. For them, they have to be aware of customer-support issues including setup and data-security issues regarding this extra functionality.

Connected modules for construction sets and similar hobbies

The same concept also extends to construction-set platforms like Meccano, Lego and FischerTechnik where children and adults build items using the pieces that are part of the respective platforms. In this case, anyone to do with these platforms could offer connected modules or kits that have the ability to control one or more items in their platform-based project like a motor, light or solenoid using an “Internet Of Things” approach. Here, these modules have to be able to seen as equivalent to a connected toy or novelty, especially if the idea is to implement cameras, microphones or GPS sensors.

It also applies to model railways, track-based car-racing sets and the like where they can be extended with functionality modules sold by the set’s vendor or a third party catering to these hobbies. Again the modules also need to be designed for security if they are capable of being part of the Internet of Things.

Use of these items

There is the desire for people to buy these toys and novelties as gifts for others in their life. It also includes the fact that the recipient wants to get the item “up and running” as soon as possible.

This will involve having the device connected to a host device through Bluetooth or USB or to a home network for proper reliable use. It should be about a standard process that is implemented for onboarding including the installation of any extra software.

Key security issues

A key security issue concerning the connected toy, novelty or similar device is that it can be an espionage item presented in an innocuous form. It can concern us both at home and in the office because we can easily be talking about items that are confidential and sensitive in our personal and business lives.

This was highlighted in a crime-fiction form to the Germanic viewership in Europe through the Munich-based Tatort “Wir Kriegen Euch Alle” (We Get You All) episode shown there on Sunday 9 December 2018. This story was focused around a connected doll that was given by strangers to various childrens’ families in middle-class Munich and was used as a surveillance tool to facilitate crimes against the families.

It underscored that Germany has some very strict policies where the sale of surveillance devices that are disguised as innocuous items isn’t allowed in that country. But, in the story, these dolls were imported in to Munich from a location in Austria which is a short drive away and facilitated by the Schengen Agreement in the European Union.

Let’s not forget the recent cyberattacks such as the Mirai botnet that were facilitated by dedicated-purpose devices like network-infrastructure equipment and videosurveillance cameras which were running compromised software. Then there are factors regarding data-storage devices and “bag-stuffer” novelties given away during business conferences where there is the possibility of them being loaded with questionable software.

What would I like to see

Security

There has to be identification on the toy’s or novelty’s packaging about what kind of sensors like location sensors, microphones or cameras that the device has, as well as whether the device transmits data to online services. This includes whether the device does this directly or via intermediary software running on other computer devices such as mobile devices running companion mobile-platform apps. Even a hang tag attached ti the novelty could highlight what kind of sensors or online services it uses which would be important for those items sold without packaging.

Preferably, this can be achieved through standard graphical symbols indicating the presence of particular sensors or the use of online services and social networks. It can also identify whether the toy’s or novelty’s functionality are dependent on these sensors or online services.

App stores and other software platforms that host “connector” software have to implement stringent permissions for these kind of devices especially if they use a microphone, camera or location sensor. There could be standards on whether the software is allowed to record from these sensors over a long time or keep the recording persistent on the host device or online service.

A limitation I would also like to see for connected toys and novelties that if they work with another computing device including a smart speaker, the connection can only be effectively within the same premises. This can be tested through the use of a peripheral-grade connection like Bluetooth or USB to a computing device or limiting the range of discovery for network-based devices to that of the same logical private network or subnet. Here, it represents all the devices on the LAN side of a home-network’s router and excludes devices existing on other logical networks served by the same physical device like “guest” or “community” networks.

As far as Bluetooth is concerned, the toys should implement authentication processes during the setup phases. Then the device ceases to be able to be discovered once it is paired with a host device. It is like what we are seeing with Bluetooth headsets and similar devices that have been recently released. They may also have to work on a limited radio range to prevent successful connection from a distance.

There should also be a simple “factory-reset” process to allow the user to place the toy or novelty in to setup mode, effectively wiping data from the device. This allows a recipient to effectively “claim possession” of the device as if it is new, avoiding the situation where they may be given something that is compromised to do what someone else wants it to do. It also applies to situations where you are dealing with ex-demo stock or gift-fair samples.

This should also apply to online services associated with these toys or novelties where the user has proper account control for the device’s presence on that service and any data collected by that device.

There are devices that observe particular functions according to a particular device class supported by many platforms like a novelty nightlight or illuminated Nativity scene that works with a “smart-home” setup or a novelty Bluetooth speaker. These devices have to work according to the standards in force for that device class and its connection to the host device or network. It is more important where the device may perform further tricks while running alongside dedicated vendor-created software but is able to have basic functionality without this software.

A software-level security approach could be achieved through an open-source or peer-reviewed baseline software that ticks the necessary boxes. This would apply to the firmware installed in the device and any apps or other companion software that is required to be run on other computing devices for the novelty to operate. It also includes a requirement that this software be reviewed regularly for any bugs or weaknesses that could be exploited, along with compliance requirements.

This could be assessed according to a set of European norms because the continental-European countries are very concerned regarding privacy thanks to their prior history.

As far as modules for integration in to toys, novelties and giftware is concerned, the modules should meet the same requirements as finished products that would have the same functionality. Craftspeople should also be aware of data security and user privacy issues when it comes to choosing modules for their projects that are dependent on computer devices or networks.

Setup and Connectivity

Another area that is a sore point for connected toys and novelties is bringing these devices on board for you to use. In a lot of cases, this is exacerbated through awkwardly-written instructions that can test one’s patience and not much knowledge about what is needed for the device to work fully.

The device packaging could use Wi-Fi, Bluetooth or other standard logos to indicate what kind of connectivity it needs to operate fully. This is to be highlighted with the “app store” logos for various operating-system app stores if the device is dependent on companion apps for full functionality. Similarly, use of other official platform logos can be used to identify compatibility with platforms like smart-TVs or voice-driven home-assistants.

Simple-yet-secure setup and onboarding procedures are to be paramount in the design of these devices. For Bluetooth-based devices, they should use “simple-pairing” such as pressing a button on the device to make them discoverable. This is even made easier with a trend towards “out-of-the-box” discoverability if the device isn’t paired with any host. Then the user activates their host device in “Bluetooth Scan” mode to discover the device,  subsequently with them selecting the device through its presentation name.

Windows, Android and iOS are even implementing simplified device-discovery routines for Bluetooth devices, with the ability to lead users to visit the app store to install complementary software. This will make things easier for users to get the toy or novelty up and running.

Wi-Fi-based devices would have to use WPS-PBC push-button setup, Wi-Fi Easy Connect, or other simplified setup processes for integration with the home network. It also applies to other network connection standards where you have to enrol the device on to that network.

Smart-home devices that implement Zigbee, Z-Wave and similar standards also have to implement simplified discovery protocols implemented in these standards to bring them on-board.

In relationship to security, I underscored the need for use of device-class standards as much as possible. But it also applies to connectivity and useability where a device that honours device-class standards is also easier to use because you are operating it the same for its peers.

Conclusion

This year will become a time where security and useability will be of critical importance when toys, novelties and other similar goods that connect to the home network and the Internet are designed and sold to consumers. Here, these issues may avoid these kind of toys ending up in disuse due to security or setup issues.

Troubleshooting a network printer that you can’t print to

Dell 1130n compact monochrome laser printerYou may find that you cannot use your printer or multifunction from your computer via the network yet find that it can perform standalone tasks such as copying and faxing for example. It is even though the printer used to print from the computer via the same network connection just before the problem surfaced.

In the case of multifunction printers, you may not be able to start a scanning job destined for your computer from the machine’s control surface or, at worst, scan to your computer at all. This is although you previously were able to scan that way before. It can also affect computer-based faxing for fax-equipped multifunction printers.

This is a situation I have ran in to myself with my computer and my inkjet multifunction printer on many occasions. But I have also assisted a small company whom I deal with regularly that faced similar problems with two of their colour laser printers that are connected to their business’s network.

There are two main problems that can cause you not to print to your network printer even though you could previously print to the same machine.

Driver software and operating-system problems

If the fault occurs with one particular computer rather than all computers and devices that use the same printer driver software, the driver software or its configuration may be balky.

This may happen if you have continuously added and removed many printers from the same computer, something I have encountered as I install and remove many different review-sample printers from my desktop PC through the course of adding content to this Website.

Check and reinstall the driver software

In some cases, this problem can be caused by faulty driver software and you may have to download the latest driver software from the manufacturer’s Website. It is infact a process I encourage people to do when installing new hardware because the software supplied on the CD in the device’s carton may he “rushed out” in a bid to get the device to market quickly.

Check the state of the operating system’s print functionality

Similarly, it may be worth rebooting the computer because the print spooler (the software that manages the printing function) in the operating system may have stalled. On the other hand, you may have to manually start the print spooler. In Windows 7, this would be found by searching for “Services” in the Start Menu’s Search option, whereupon you look in the list for “Print Spooler” and make sure that’s started.

Network interface not working

If this happens with all of the computers in the network, it may be due to the printer itself losing connection with the network. This may also affect other network functions like IP-based faxing, HP ePrint or other Web-based features.

Check for faults with the network

Check for obvious faults with the network connection like faulty Ethernet leads, infrastructure equipment like a router, switch or HomePlug bridge turned off or not functioning or, in the case of Wi-Fi setups, the quality of the wireless signal.

In some cases, you may have to turn the network-infrastructure device off at the AC power for a few seconds because it may have “frozen” due to something like a power surge. Use the network-status option on the printer’s control panel menu to check that it can “see” the network after you check these factors.

Reset the printer’s network connection

Sometimes, you may have to force a network reset on the printer. This can be done through an option that is, again, found on the same setup menu on the printer’s control panel. On the other hand, you may have to simply unplug the machine from the AC power, waiting a few minutes, then plug it back in.

Conclusion

Once you know how to tackle these printer problems, you may then be able to see longer service life from your equipment.