You are on page 1of 9

Position Paper realized across an increasingly There was a time when the

virtualized organization ... these business world operated like a


Strategic Networking issues are central to Monopoly game -- Stay on a
Imperatives for the Real- organizational survival and predictable path that marches
Time Enterprise profitability. The role of the CIO around the board, deal with the
has clearly transitioned from cards as they fall, grow as big
New business realities bring managing a cost center to a as possible. Do this, and you
profound implications for strategic partner in the business are virtually assured of
network and information at the cabinet table, recognizing accumulating wealth. Those old
management strategies. IT the importance of the IT rules have changed. Today’s
executives have had to infrastructure has on business business game is more like the
reassess the way they build, operations, workflow and reality TV show “Survivor,”
manage, and use the IT relationship with customers. where success rests on the
infrastructure. Under constant ability to forge close alliances
pressure to do more with less, Can the IT infrastructure be and constantly adapt to new
they have to constantly push for leveraged to make employees challenges. In August 2003,
more competitive and proactive more productive? Can it be viruses, along with overt and
information management leveraged to create new covert hacker attacks, caused
models. revenue opportunities and help $32.8 billion in economic
create stronger engagement damages, according to a report
The networking technology with customers? Can IT from mi2g, a digital risk
advances of the last decade -- revolutionize the very nature of assessment company based in
particularly optical, Ethernet and how business is done? How London. mi2g also notes that
IP networking, and broadband customer contacts take place? the "Sobig" virus alone
wireless -- have fundamentally How information about suppliers accounted for $29.7 billion of
reshaped business and customers is shared and economic damages worldwide.
environments in ways that are used?
simultaneously advantageous Security breaches, and resulting
and detrimental. In a business Nortel says yes. The three loss of productivity and access
climate that is more punishing business realities identified in to confidential data, is costing
than ever to the inefficient and this paper drive the definition of enterprises millions of dollars,
the slow-moving, businesses three networking strategic but the security imperative goes
are under pressure to manage imperatives for IT, which beyond these financial
their information assets more support the delivery of these incentives. Government
effectively, efficiently, and values. Partnering with Nortel regulations are placing
wisely. can position the enterprise to additional requirements on
win. enterprises. Examples include
The IT infrastructure is no the Sarbanes Oxley Act on
longer an adjunct support Business Realities Facing IT corporate governance and the
structure; it is the essential US Patriot Act; industry specific
foundation for enterprise Business Reality #1: The regulations such as the Gramm-
performance. How information rules of the game have Leach-Bliley Act for the financial
is obtained, validated, stored, changed: Meeting regulatory industry and the Health
accessed, distributed, and how compliance and security Insurance Portability and
real-time collaboration is requirements are table stakes. Accountability Act (HIPAA); and
security-related regulations
outside of the US such as the Speed to market is critical in the click of a mouse,
Data Protection Directive in the their industry. This has as much organizations need to manage
EU. These have wide-ranging to do with business processes the intrinsic value in
impacts on security, including and the ability to access relationships -- looking at the full
requirements for encryption, business information in a timely dynamics of interactions with
disaster recovery and business fashion, as it has to do with customers. That requires a
continuity, archiving and providing increasingly technology infrastructure that
consumer privacy. Failure to distributed employees with the supports a unified, relationship-
comply with these regulations collaborative tools, starting with based view of customers,
can bring civil and criminal business-grade telephony, to spanning all touch points and
penalties. work more effectively across the systems.
virtual enterprise. Jack Welch,
Regulations at all levels, the legendary CEO of GE, has The technology reality is that
accelerating security attacks been quoted as saying “An virtually all vendors and most
and vulnerable networks -- no organization's ability to learn, enterprises are adopting IP
wonder IT executives are and translate that learning into Telephony as the foundation to
putting security and disaster action rapidly, is the ultimate address real-time collaboration
recovery at the top of their competitive business and mobility requirements of
investment priorities. advantage.” enterprises, business continuity
and to enhance customer
IOS vulnerabilities already out What is impeding enterprises as engagement through
there or yet to be discovered they attempt to increase their virtualization and enrichment of
present a major challenge to real-time communications contact centers. Nortel’s view is
network administrators and effectiveness? Knowledge that IP Telephony is a key
security professionals. It is workers and others with the enabler of what it refers to as
increasingly difficult not only to need to communicate and/or “real-time converged
plug the operating system's collaborate are faced with a communications” (aka Unified
security holes. Patching IOS number of pain points including: Communications by the Gartner
requires replacing each IOS ƒ Losing productivity when Group, and more generally
version with an updated version, away from the office (the multimedia communications),
then rebooting the system and lack of geographic made up of voice, Instant
making sure that the improved flexibility). Messaging, video and
IOS doesn't interfere with ƒ Using disparate systems application sharing,
network cards or other network (e.g. telephones, room conferencing, combined with
devices plugged into the router video conferencing, email, presence and ultimately location
or switch. "To fix it, you have to Instant Messaging, file intelligence. While each of these
put a whole new image on a servers) to communicate modalities can be deployed on a
device and restart it," said John across teams. one-of basis, converged
Pescatore, VP for Internet ƒ Managing multiple contact communications brings these
security at IT advisory firm numbers and inboxes (the together and provides a
Gartner. 1 lack of service ubiquity). seamless user experience
across all these media. These
Business Reality #2: Time to In addition, many enterprises capabilities come together to
X is the key metric: Reducing see regulatory and security enable the real-time enterprise
time to decision, time to liabilities arising from employees and result in dramatically more
service and time to revenues using public communications effective collaboration with
is the path to the real-time services, especially Instant resulting shortened time to
enterprise Messaging, email and other decision. They provide the
Internet-centric services. ability to enable engaged
applications to further
On the customer side, the productivity and to enhance the
1 impacts can be even more enterprise customer experience.
“Next Big Target” by Larry
dramatic. Now that customers They allow the organization to
Greenemeier, Information
can leap to the competition with engage the right resources to
Week, November 7, 2005
address the opportunity at hand, Business Reality #3: You policies or vendor lock-in just
whether these are in the office have to do more with less: serves to exacerbate the
or out of the office, on the local Too much money and budgetary crunch. Opex is
area network or wide area resources on day-to-day heavily driven by device
network, connected over operation! complexity, and for those
wireless or wireline connections running IOS this can be a
or using voice or data CIOs face several difficult serious drain on resources.
communications. challenges in this regard. Opex is also driven by network
Security threats continue to complexity, caused by moving
Gartner Group (February 2005) grow in sophistication and network intelligence out to every
positioned Nortel a leading intensity. Enterprise traffic wiring closet or even wireless
player in their Magic Quadrant continues to grow from LAN access point.
analysis, high on ability to increased use and from new
execute and high on vision in enterprise-wide applications. "IOS has become large,
the Unified Communications monolithic, and bloated with
market. At the same time, IT staff are already stretched to features and functions," said
Gartner Group positioned Cisco the limits with the daily tasks of Forrester Research analyst
as a niche player, low on ability managing, upgrading and Robert Whiteley. “It is
to execute and low on vision in engineering their networking increasingly difficult ... to get
the Unified Communications and computing environments, customers to update to the
market. and yet are expected to address newest versions. The customer
new opportunities whether in the heel-dragging is caused by IOS
Nortel proof points: form of new customer service complexity and by the work
ƒ Nortel itself has deployed initiatives or mobility. Meanwhile involved in upgrading.“2
20000 SIP multimedia it’s not getting any easier to find,
clients across its highly hire, train, and retain skilled staff
“Cisco charges up to
distributed and mobile work to run these complex IT
force. environments. 70% more than
ƒ A 100-person investment rivals…Some customers
bank is first to deploy SIP If you keep doing the same are sick of getting
and real-time converged thing, you'll keep getting the
communications across the same results. It’s an old adage, squeezed like that”
entire company. but still true. If the present Business Week Online,
ƒ A financial stock exchange enterprise network architecture February 2003
has deployed a high is expensive to manage,
capacity pico-cell wireless troublesome to maintain, short
LAN to provide reliable on bandwidth, and inflexible to
mobility across its trading growth and change, deploying Strategic IT Networking
floor. more of the same equipment or Imperatives
adding additional features and
Gartner in its Cisco IP functions isn’t going to solve the Many enterprises have to face
Telephony Update (April 2004) problem. If the network grows the fact that the networks they
said that “The trust Cisco has in ‘intelligence’ and the expense have deployed do not and often
built up in data networking has of performance, IT headaches cannot deliver the security,
given companies a false sense only turn into migraines. reliability, short delays and
of security in relation to its voice lossless operation required by
business. Cisco has also been This reality has two real-time converged
party to some high profile components: capex and opex. communications. For example,
failures” citing a state Replacing network switches and loss of voice can result in
government (400,000 end routers that can't do the job may
points), a city government (8500 be a necessity, but paying high 2
“Next Big Target” by Larry
end points) and a financial premiums due to procurement
Greenemeier, Information
institution (7500 end points). Week, November 7, 2005
incoherent speech, while hardened across the discovery, eavesdropping or
excessive delays introduce management, media and control misappropriation, while stored
intolerable echoes and planes. In addition to platform or in transit across networks,
unnatural pauses in human security there are four other using technologies such as
interaction, making interruptions important elements to a Layered IPSec, Secure Sockets Layer
awkward and positive Defense approach to security (SSL), Secure RTP (SRTP) and
responses appear hesitant. and business continuity. Transport Layer Security (TLS).
Confidentiality of voice The direction is that these will
conversations is another The goal of Endpoint security is increasingly work in a closed
sensitive area; clearly to ensure valid user identity, and loop fashion (configure, monitor,
safeguards must be deployed to device security policy detect, adjust) leading to
guard against eavesdropping compliance (e.g. most recent autonomic controls that are
from desktop PCs. Protecting anti-virus software). Endpoint managed with business policies.
voice and multimedia security is applied across wired
communications also means and wireless endpoints within IP Telephony enables the
making firewalls aware of the network as well as those at deployment of robust disaster
related signaling protocols. remote sites, where there is less recovery and business
There are other dimensions to control over the users' devices. continuity solutions for
this challenge ranging from Perimeter security, the second telephony, much the way SAN
power over Ethernet, to quality key element of Layered extensions have provided this
of service, resilient designs and Defense, is applied to control for data. In fact, Nortel has lead
proper bandwidth engineering. traffic traveling between zones the market with its business
Not having proper technologies of trust, and can be applied at continuity and disaster recovery
in place or not engineering the internal perimeters, at the Storage Area Network extension
networks to support voice and external edge of the network solutions, developed and
multimedia can impact (the DMZ), around data centers, certified with its partners such
employee productivity as well as around secure multimedia as EMC, HP, IBM and Sun.
customer service. zones to protect multimedia and Nortel now offers industry-
IP Telephony call servers, and leading active-active back-up
The following three networking even around a single critical solutions for its IP Telephony
strategic imperatives are offered user. Keeping watch for systems allowing one provincial
as the response to these malicious software and traffic government to deploy a
challenges. anomalies, enforcing network centralized IP Telephony
policy, and enabling survivability system operated out of two data
Strategic Imperative #1: Think is the role of Core network centers, for hundreds of sites
Layered Defense for business security in a Layered Defense and 45000 users.
continuity approach. Continually
monitoring the network for The implications on the
The layered defense approach malicious activity is key to networking infrastructure are
ensures that there are no single ensuring that if an attack slips that security needs to be
points of security failure in a through other layers of security embedded in the network, with
network. This is accomplished that a network will detect it and centralization of security
by using multiple approaches to take appropriate action to block functions wherever feasible, to
security enforcement and the attack and ensure decrease the cost of ownership.
reliability in different parts of the survivability. Time to isolate the For example, security-related
network. Layered defense effects of security attacks is a functionality in LAN edge should
approach is also bolstered by key parameter to minimize the be limited to functions such as
leveraging systems that utilize business and reliability impacts enforcing policies and
security capabilities and of attacks. Secure participating in endpoint security
products from best-of-breed Communications (focused on mechanisms, leaving more
security vendors. Platform Multimedia) is the final element sophisticated mechanisms such
security ensures that all of layered defense. This perimeter protection, firewalls
networking and network- protects corporate and customer and threat protection analysis to
attached platforms are information from unauthorized the network core. In addition
and as discussed in the next for its distributed IP significantly degrade in capacity
section, security mechanisms Telephony contact center. when faced with voice traffic.
need to be multimedia-aware ƒ A NYC-based financial Voice is not just another
and operate without introducing institution deploys multi- application that runs on an IP
impairments for real-time traffic. terabit optical network for network.
business continuity/disaster
Nortel can offer enterprises recovery. Real-time converged
complete multimedia-friendly ƒ A financial institution is communications cannot tolerate
security solutions using a deploying a secure routing packet loss since there is no
Layered Defense approach that layer to lead in encrypting time to retransmit, and must
provides adaptive, end-to-end all branch and Automated operate within an end-to-end
protection for their networks, Banking Machines traffic 150msec delay window so that
including endpoint, perimeter, across the WAN. the interactive nature of human
core network, and communications is not
communications security, as Strategic Imperative #2: impacted. This drives the
well as security management – Reliability and real-time deployment of Quality of Service
securing the network while performance to meet the mechanisms across the
enabling the virtualized needs of multimedia network, including the
enterprise. Incorporating Nortel communications bandwidth-rich LAN
innovation and leveraging best- environment, to ensure that
in-class technologies from such Enterprises should deploy real-time traffic always receives
companies as Check Point and networking and security priority treatment even in the
Opsware Inc., these security products that deliver consistent presence of data traffic bursts.
solutions enable enterprises to Quality of Experience to users, WAN bandwidth needs to be
not only protect against growing by meeting the security, engineered appropriately with
threats to their operations and reliability, short delays and as much as 80Kbps required
employee productivity, but meet lossless operation required by per voice call and typically 100-
the heightened privacy and real-time converged 200Kbps for desktop video. It
accuracy requirements of communications. Unfortunately, also drives the deployment of
regulatory compliance. routers and switches that have service management
evolved from a multi-protocol capabilities that include
Nortel proof points: best effort data networking proactive voice quality
ƒ IT Services Firm achieves world may not be able to deliver management on an end-to-end
100% business continuity the functionality and basis.
performance required, or may

Telephony Property Data


150msec max End-to-end delay >1 sec response times
Very low Tolerance to variable delay High
None Tolerance to data loss High: TCP for retransmission
30-80 Kbps per call Bandwidth needs Adaptable to availability
Expected Confidentiality Desired
Table 1: Comparison of voice (and real-time multimedia) and data networking requirements

Security mechanisms, wherever security platform architectures short IP packets is a significant


they are deployed, also need to that were designed for data may challenge for router networks,
be made aware of multimedia not be acceptable for real-time particularly when various
protocols (typically achieved applications, and may need to security mechanisms, such as
through software upgrades), be replaced. firewalls, VPNs and Access
and not introduce performance Control Lists have been
impairments that will effect the The fact that the packetization activated. In fact, in most router
user quality of experience. The processes for voice aimed at architectures, turning on
latter is problematic since minimizing latency, creates very security functions and handling
short voice packets results in a upgrade times. Nortel has converged networking, enabling
drop of up to 80% in packet decades of experience in real-time applications that
handling capacity. building some of the most enhance employee productivity
reliable systems in the world. Its and business effectiveness, and
The telephony world refers to Enterprise Routing Switch 8600 increase customer engagement.
99.999 percent base system is one of the most resilient
reliability based on a mean time routing switch platforms in the Nortel’s Secure Router
between failure measured in industry, forming the backbones products, which incorporate
tens of years and redundant of many enterprise and carrier routing, VPN and firewall
common control (for large networks. Link level reliability functionality, excel at the low-
systems). For IP Telephony, the recognizes the fact that IP latency, small packet throughput
definition of base system routing system can take a long demanded by real-time voice
reliability is as much a function time to converge after failures, and multimedia applications.
of how IP Telephony functions measured in minutes in large Independent testing authority,
are distributed and designed, as networks. Therefore Nortel has Tolly Group, has demonstrated
of the underlying IP networking invested heavily in providing these as capable of delivering 2-
infrastructure. Clearly, a rapid recovery from failures at 7 times the throughput of
comprehensive approach is the link level. For example, equivalent routers from the
required to meet the reliability Ethernet link aggregation competition, including Cisco.
expectations of IP telephony including Nortel extensions
users. Ultra-reliable networking provides sub-second recovery Nortel’s link aggregation
is achieved at the nodal, link from link failures even across solutions, referred to as Split
and network levels. Time to dual homed nodes (between Multilink Trunking, recover four
recover is a key metric in this core switches or between wiring times faster than comparable
new real time communications closets and core switches). solutions from Cisco, according
converged network. Nortel was also a pioneer in to tests undertaken by Tolly
resilient packet rings that Group. Split Multilink Trunking
Nortel solutions have combine optical ring and is also much simpler to
Ethernet technology to provide configure than schemes based
been deployed in some 50-ms recovery from failures. on Fast Spanning Tree
of the most mission- Network level redundancy Protocols.
critical environments: leverages various IP networking
techniques to provide load Strategic Imperative #3:
Air traffic control balancing across paths and Strategic vendor partnerships
systems, healthcare additional levels of LAN and for lower cost and increased
institutions, stock WAN redundancy. These agility
capabilities meet the demanding
exchanges and financial needs of IP telephony and real- The path to lowest total cost of
institutions, utilities, time multimedia, but also deliver ownership starts with
military field systems the benefits of increased architecting systems that
reliability for all applications concentrate network intelligence
and service provider
running across the network. in the core and keeps the edge
networks. relatively simple, while adhering
Nortel offers a full-range of to open standards. For example,
voice and multimedia friendly with 80% of LAN investment in
Nodal reliability is achieved and aware security, wireless the wiring closet, it makes sense
(particularly in the core) through and wired LAN, and WAN to keep the LAN edge as
traditional means including solutions that have established operational simple as possible
redundant switching fabrics, Nortel as a #2 player in the while striving to achieve the
power and fans, and hot swap networking space. These have lowest cost per port to support
ability, but also through voice- been architected with secure required security and traffic
driven capabilities including sub- multimedia as an upfront management functionality. In
second switchover, short requirement. In this way, Nortel the WAN, similar thinking can
system reboot and software can help enterprise evolve be applied to the branch
network achieved through example SIP, Web Services, data infrastructure along with
centralization of functionality XML and SAML. market-leading real-time
wherever possible. For converged communications and
example, many enterprises are Some would advocate going engaged applications solutions
centralizing their IP Telephony with a single vendor for for enterprises, is a clear low
systems including unified telephony and networking risk opportunity. Nortel is more
messaging, and virtualizing their because this eases the task of than willing to submit its
contact centers with an eye for ensuring that performance technologies to customer or
lowest TCO. requirements of voice are met. third party testing to validate its
Others would say that since IP performance claims and to
This leads to an opportunity to telephony is a real-time demonstrate its technological
partition the network and select application running on an IP differentiators in the lab, not just
a strategic vendor in each area, network, selecting a vendor who on paper. In addition, Nortel
while keeping the number of is best in breed in telephony, professional services can help
vendors to a manageable independently of the networking enterprise bring it all together
number. Partitioning can be vendor is the best approach. and even manage the day-to-
done on a functional basis However, enterprises too often day operation of the enterprise
(voice and data) or by site type accept vendor marketing at face communications environment.
(branch vs. head office) or even value. If a vendor only has a
on a regional basis. This allows hammer, then everything looks If you have or are
the enterprise to create a more like a nail. If the vendor has no
considering Nortel as your
competitive environment among installed telephony base, they
its strategic vendors which at will argue that evolving to IP strategic Telephony vendor,
the end of the day is in the best telephony "hybrid" systems is a then your IT department
interest of all stakeholders. bad thing (for their revenue
should seriously consider
Concerned about the maturity of stream!); at the same time, they
standards? The reality of IP may argue that putting IP leveraging the partnership
networking as see in the telephony call control in a in the LAN and/or branch
Internet is that it is a highly "hybrid" router is a good thing secure routing environment
multivendor environment today. (for their revenue stream!). A
Juniper’s success in taking data vendor may deeply as well.
away significant share from discount its IP telephony offer,
Cisco in public core networks is recovering lost revenues from Nortel real-time converged
testimony to this. The reality of network upgrades after the communications solutions have
IP Telephony today (and of deployment is started. Looking been certified by third parties
telephony over the decades) is beyond marketing message is and are supported by Nortel to
that, even if a single strategic critical. A vendor committed to operate on other vendor’s
vendor is selected, it is a multivendor interoperability is a networks, creating choice for the
multivendor environment when lower risk in this evolution than enterprise in deploying
looking at unified messaging, one with a single-vendor bent. converged networks.
conferencing, contact center Open standards are critical to
and CTI applications. Moreover, provide the flexibility the Nortel can deliver the IP WAN
the industry is now talking about business needs to avoid secure routing solution at a
business-transforming real-time dependence on vendors and lower cost of ownership, starting
converged communications leverage new technologies and with a compelling discount
across the virtual enterprise, innovations as they emerge. (typically exceeding 20% of the
embracing partners and router market leader), while
customers. It's a whole Nortel believes a diversified delivering superior performance.
ecosystem that is multivendor approach offers more flexibility For example, configuring a
by its very nature, including to embrace innovation. firewall on the recently
clients and applications, with Partnering with vendors such as announced Nortel Secure
interoperability assured through Nortel, who is one of two Router in 20% of the time in
open standards, including for vendors that can deliver a takes to configure an IOS
complete end-to-end LAN/WAN firewall.
The Nortel Difference ƒ Engaged applications Nortel proof points:
including advanced speech ƒ Nine of 10 Fortune 500
Nortel understands the self-serve and agent- companies rely on Nortel
challenges faced by enterprises assisted contact centers each day - serving as the
in developing stronger customer ƒ Endpoint, perimeter, core only networking vendor to
relationships, and the critical and communications have deployed 50 million
role of IT in serving business security systems telephony lines and 50
objectives. The IT infrastructure ƒ Service and network million Ethernet ports.
is no longer an adjunct support management ƒ More than 93% of the Top
structure; it is the essential ƒ Professional services 100 Manufacturing
foundation for enterprise Nortel is proactively involved in companies, including those
performance. Nortel is one of standards, is committed to in Aerospace,
two major vendors that making multi-vendor Pharmaceuticals,
addresses both enterprise and interoperability a reality, and is Automotive, and IT run on
service provider markets and expanding an ecosystem of Nortel.
delivers the full spectrum of client, security and application ƒ Every single one of the
secure end-to-end converged vendors to deliver more value to world’s top 20 airlines relies
networking solutions. Nortel is enterprise customers. With this on Nortel.
focused on delivering lower solution breadth, and ƒ More than 80% of the Top
TCO, increased employee technology depth in both 100 banks in the US rely on
productivity and stronger enterprise and carrier markets, Nortel.
customer engagement through: Nortel is an ideal strategic ƒ Fifteen thousand healthcare
ƒ Ultra-reliable converged IP, partner for enterprises to help institutions in US and
Ethernet and optical achieve their business Canada rely on Nortel
networking that span the objectives. While Nortel can solutions.
data centers, campus sites deliver the total end-to-end ƒ Every single one of the top
and remote and branch converged communications 10 largest universities in
offices. solution, it represents a low risk North America, serving
ƒ Fully featured real-time choice in any part of the more than 500,000
converged communications enterprise network, whether in students, and 9 out of 10 of
systems including IP LAN or WAN, wired or wireless, the largest public school
Telephony voice or data, private or hosted, districts in the US, serving
ƒ Secure on-site and off-site or employee-facing or customer- more than 3.5 million
mobility including wireless engaging environments. students, run on Nortel.
LAN and wireless mesh
networks

A Case In Point -- Branch Office Renewal Situation


Your branch solution was established in preparation for Y2K, and it may be time for a refresh.
Requirements: New levels of security are required, traffic has increased and VoIP has become a reality.
Voice options: Nodal voice (as today) or centralized voice served from your regional office.
Data options: General purpose Swiss-army knife branch routing platforms or specialized secure router designed to meet
reliability and performance needs of voice and multimedia.
Vendor options: horizontal (voice vs. data) vs. vertical (branch vs. central site) procurement strategies.
Vendor choices: only two vendors can meet your needs (Nortel and the other vendor).
Strategic vendor partnerships: You have or are considering Nortel as your IP Telephony vendor and should consider
Nortel as your strategic converged branch solution provider, possibly working into another vendor’s core network.
The Nortel advantage: Rich telephony features without compromise; evolution at your own pace to multimedia collaboration
and mobility; layered security- and voice-optimized wired and wireless LAN and WAN data capabilities.
Why now: The Nortel Secure Router portfolio extensions, derived from Nortel's acquisition of Tasman Networks announced
in late 2005, excel at the low-latency, small packet throughput demanded by real-time voice and multimedia applications;
deliver 2-7 times the throughput of equivalent competitive router products, even when running integrated VPN acceleration,
secure dynamic routing and stateful packet inspection; and deliver dramatic installation simplification using a Cisco-like CLI;
all at a significantly lower cost than competitor products.
In the United States: In Europe: In Greater China:
Nortel Nortel Nortel
35 Davis Drive Maidenhead Office Park, Westacott Way Beijing Headquarters
Research Triangle Park, NC 27709 USA Maidenhead Berkshire SL6 3QH UK Nortel Tower
Telephone: 00800 8008 9009 or Sun Dong An Plaza
In Canada: +44 (0) 870 907 9009 No 138 Wang Fu Jing Street
Nortel Beijing 100006, China
8200 Dixie Road, Suite 100 In Asia Pacific: Telephone: +86 10 6510 8000
Brampton, Ontario L6T 5P6 Canada Nortel
Nortel Innovation Centre
In Caribbean and Latin America: 1 Innovation Road
Nortel Macquarie University Research Park
1500 Concord Terrace Macquarie Park, NSW 2109
Sunrise, FL 33323 USA Australia
Telephone: +61 2 8870 5000

Nortel is a recognized leader in delivering communications capabilities that enhance the human experience, ignite and power global commerce, and secure and
protect the world’s most critical information. Serving both service provider and enterprise customers, Nortel delivers innovative technology solutions
encompassing end-to-end broadband, Voice over IP, multimedia services and applications, and wireless broadband designed to help people solve the world’s
greatest challenges. Nortel does business in more than 150 countries. For more information, visit Nortel on the Web at www.nortel.com.

For more information, contact your Nortel representative, or call 1-800-4NORTEL or 1-800-466-7835 from anywhere in North America.

This is the Way. This is Nortel, Nortel, the Nortel logo and the Globemark are trademarks of Nortel Networks. All other trademarks are the property of their
owners.

Copyright © 2005 Nortel Networks. All rights reserved. Information in this document is subject to change without notice. Nortel assumes no responsibility for
any errors that may appear in this document.

NN114700-011606

You might also like