Managing the transition from legacy to LTE in the telecoms world

VanillaPlus, Nov 2016

…Network operators want to grow and adapt to the change but cannot afford to suddenly pack up their bags and leave behind their legacy interfaces. Legacy SS7 based services need to work alongside LTE protocols to ensure that both ends of the functionality spectrum meet the QoS required. Operators need a signaling gateway solution for SS7-IP interworking that they can rely on to ensure the transition from legacy to LTE is as smooth as possible.

Read more…

Why Narrow Band IoT can help the ever growing concept truly take-off

Telecoms.com, Sept 2016

…With strong predictions that NB-IoT will significantly improve the power consumption of devices, system capacity and spectrum efficiency, especially for deep coverage, at a low cost, operators need to be equipped with the correct tools to make sure it’s a true success. Launches of the technology are expected soon so now is the time for the industry to prepare and ensure everything is in place to cope with the undoubted high demand on the core networks from end users.

Read more…

Secure: Protecting networks in the IoT age

Smart Chimps, Sept 2016

…The huge potential for market growth is one major attraction that IoT offers to operators, yet 86% of them admit they are not yet ready for the concept [Telecoms.com Intelligence Annual Industry Survey 2016]. In addition, according to Telecoms.com Intelligence IoT Outlook Report 2015, concerns regarding security are the biggest barrier to implementing IoT among operators, and just 10% said they are fully capable of launching secure IoT services. These are worrying statistics so it’s essential for operators to have peace of mind that their networks are secure…

Read more…

The importance of network security in the age of the Internet of Things

Telecom Ramblings, July 2016

…We know that capacity and how operators can handle the mass deployment of low speed, low volume IoT networks is a key issue, and will ultimately will determine whether the phenomenon is a success for years to come. However, with this increased traffic comes the major issue of security. Instead of reacting to threats to the core network, which IoT networks will run off, operators need to ensure they plan for the worse and have prevention measures in place for possible hijackers. The repercussions of such a breach can have serious consequences for both the operator and end user…

Read more…

Overwhelming: Connected everything

Smart Chimps, May 2016

IoT clearly presents mobile operators with huge potential for market growth, and with the phenomenon giving the end user a greater control of their connected devices from their handset than ever before, there’s a clear demand from both sides for it to work.

However, if this tech revolution is to truly take off and its full capabilities are to be fully realised, IoT developers and mobile operators must first conquer the key issues which may prevent it reaching its full potential. In particular, in the telecom world, network capacity should be viewed as the biggest concern.

Read more…

 

SDN and NFV in 2016

Capacity, March 2016

There are voices that argue that for moderation in place of unseemly haste if this future is to be reached bloodlessly. Robin Kent, director of European operations at vendor Adax, believes that in the headlong rush to virtualise, assumptions are often made than software is where all emphasis should go at the expense of hardware elements: “To prove successful, NFV can only occur when there is architecture in place for both hardware and software,” he warns. “Getting away from proprietary hardware is good, but let’s not throw the baby out with the bath water.”

Read more…

Edge flows, test flows and IoT Security

The Mobile Network, March 2016

MWC16, the week that was…

IoT was a massive topic at MWC in general, but one particular aspect was being highlighted by signalling platform provider Adax. Adax’s Robin Kent is concerned that the sheer volume of connections, and their often inherently chatty nature (think a connected car app) will overwhelm the security and transport architecture inherent in current mobile signalling.

Read more…