NOTE! This site uses cookies and similar technologies.

Please, Accept to improve your experience of this site. Learn more

I Accept

A Telecoms Blog

When Telco Solutions Are Called For
  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Bloggers
    Bloggers Search for your favorite blogger from this site.
Subscribe to this list via RSS Blog posts tagged in IMS

Considerations-for-a-successful-900x600px-03.04.17jpg

Launching Voice over LTE (VoLTE) and Voice over WiFi (VoWiFi) has for some time been seems to be yet “another” large project operators are undertaking with more or less success and driven both by the need for operational efficiencies and customer demands.

The question is whether the colossal time and efforts that are being spent by operators to make the efficient IP-only LTE (or 4G) networks backward compatible will ever payoff? The main drivers seem to be efficiencies in spectrum and the promise of being able to provide convergent services based on IP. Moving voice calls to data networks at least in theory means a simpler network to manage and thus lower operational costs. Other industries such as digital and media have been successfully delivering these types of services for years, eating into the two cash-cows on which telecoms has been built, namely voice and messaging, only at a fraction of the investment.

SIP has enjoyed wide adoption as a signalling standard within telecom because of it's flexibility. The standard defines the length and composition of a message composed of letters and numbers. This inherent flexibility means the standard is open to interpretation when it comes to practical implementation.

Both prelaunch security verifications and measurements of quality of experience are essential to assure future operator revenue

European mobile operators are currently preparing and verifying their core and radio networks for the introduction of voice and video calls and other innovative services over LTE.

Sophisticated attacks require real time intrusion detection and analytics

Mobile network security is on top of the operators’ agenda and is discussed extensively at network security conferences and other industry events. This is partly due to the fact that security threats and attacks are increasing in numbers and becoming more and more sophisticated. At a recent international Network Security Conference, a range of topics around mobile network security policy were thoroughly discussed. The overriding impression was, though, that the network security issue seemed to be focused almost purely on the end devices and the security around these. Little was mentioned regarding the implications of moving from a circuit switched network to an all IP network and thus the exposure of the VoIP/IMS network to new security issues.