NOTE! This site uses cookies and similar technologies.

Please, Accept to improve your experience of this site. Learn more

I Accept

A Telecoms Blog

When Telco Solutions Are Called For
  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Bloggers
    Bloggers Search for your favorite blogger from this site.
Subscribe to this list via RSS Blog posts tagged in Core Network

Considerations-for-a-successful-900x600px-03.04.17jpg

Launching Voice over LTE (VoLTE) and Voice over WiFi (VoWiFi) has for some time been seems to be yet “another” large project operators are undertaking with more or less success and driven both by the need for operational efficiencies and customer demands.

The question is whether the colossal time and efforts that are being spent by operators to make the efficient IP-only LTE (or 4G) networks backward compatible will ever payoff? The main drivers seem to be efficiencies in spectrum and the promise of being able to provide convergent services based on IP. Moving voice calls to data networks at least in theory means a simpler network to manage and thus lower operational costs. Other industries such as digital and media have been successfully delivering these types of services for years, eating into the two cash-cows on which telecoms has been built, namely voice and messaging, only at a fraction of the investment.

Why Test Automation is a Strategic Enabler for 4G Services

If you are reading this you are likely to be someone from mobile in telecoms and are likely to be involved with product management, operations or testing and we encourage you to read on.

Sophisticated attacks require real time intrusion detection and analytics

Mobile network security is on top of the operators’ agenda and is discussed extensively at network security conferences and other industry events. This is partly due to the fact that security threats and attacks are increasing in numbers and becoming more and more sophisticated. At a recent international Network Security Conference, a range of topics around mobile network security policy were thoroughly discussed. The overriding impression was, though, that the network security issue seemed to be focused almost purely on the end devices and the security around these. Little was mentioned regarding the implications of moving from a circuit switched network to an all IP network and thus the exposure of the VoIP/IMS network to new security issues.

As the telecommunication services evolve with the subscribers’ applications in today’s networks, there is a growing disconnection between the perception of quality of the services the operators provide, and the actual quality perceived by their customers. As Ericsson points out on a recent paper, “The quality of user experience has always been important for operators. However, with the rise of mobile-broadband and smartphone usage over the past few years, the meaning of user experience has changed dramatically”. The issue has to do with the lack of visibility that the operator has beyond their network devices in the Radio Access Network (RAN) and the Core Network, where they cannot measure the actual connectivity the customers have on their ends. Measuring the cells power or the aggregated throughput in the core, is not the same as knowing that an important customer has a weak coverage, or his application is timing-out because of high latency in the communication.