5G Implementation Guidelines

July 2, 2019

5G is becoming a reality as early adopters have already commercialized data-oriented 5G networks in 2018 and are planning to launch consumer mobile 5G in 2019 and beyond. Whilst early adopters do not necessarily require guidance, there are still majority of the operator community that are yet to launch commercial 5G services. This document intends to provide a checklist for operators that are planning to launch 5G networks in NSA (non-standalone) Option 3 configuration.

Spotlight

Context Information Security

Context is an independently operated cyber security consultancy, founded in 1998 and focusing on providing highly skilled consultants to help organisations with their information security challenges. We work with some of the world’s most high profile blue chip companies and government organisations. Our broad service portfolio covers the areas of security penetration testing and assurance, incident response and investigations, and technical security research. We are certified by CESG and CPNI for the Cyber Incident Response scheme to help organisations respond effectively to sophisticated cyber security attacks. We helped to establish CREST and its associated standards, and, as a business, are a ‘Green Light’ CESG (CHECK) service provider.

OTHER WHITEPAPERS
news image

Securing the Future of Connected Work

whitePaper | July 12, 2021

Today’s hybrid workforce of both remote and in-office employees is the new normal as the world adapts to the COVID-19 pandemic. IT security teams are struggling to support this new global digital workforce that needs reliable, secure, and fast access to the Internet. Cyber attackers are also taking advantage of this new normal, so how do organizations prevent growing threats from web and email vectors? Traditional security strategies of routing Internet traffic through a VPN increase latency, slow performance, and disrupt the user experience. The solution that avoids these problems is to bypass the VPN by using cloud-delivered isolation, enabling organizations to provide their global workforce with completely secure access to the Internet. Menlo’s new ebook, Securing the Future of Work, discusses how organizations can deliver consistent security services to this new digital workforce through isolation in the cloud.

Read More
news image

DISH lays the foundation for 5G network security

whitePaper | April 8, 2021

As DISH builds the nation’s first, cloud-native, 5G Open Radio Access Network (O-RAN), this white paper discusses how the company is prioritizing network, system and enduser security from the outset of network deployment. In today’s software-driven world, secure connectivity isessential, enabling businesses to increase productivity, transform the way they operate and generate a higher return on investment. 5G connectivity unlocks a new level of innovation, supporting new business models and delivering innovative services and products.

Read More
news image

Unlock the Power of Private 5G: Top Applications and Key Business Outcomes

whitePaper | February 23, 2023

The private 5G market is at an early stage of development, but activity in the market is increasing. 5G accounted for over 50% of all publicly disclosed private network announcements at the end of 2022, according to Analysys Mason’s Private LTE/5G networks tracker.1 5G’s share is lower when non-public announcements are included, but it is expected that most private networks will eventually use 5G.

Read More
news image

ARIADNE – On communication-theoretic models for programmable wireless environments enabled by reconfigurable intelligent surfaces

whitePaper | June 2, 2021

With the current deployment of the fifth generation (5G) of communication systems, it is now a critical time to identify enabling technologies for the sixth generation (6G) of communication systems. 6G systems are expected to fulfill more stringent requirements than 5G systems, on transmission capacity, reliability, latency, coverage, energy consumption, and connection density.

Read More
news image

Multi-Vendor 5G Core Networks

whitePaper | July 26, 2021

5G standalone (SA) operation, using a new core network, is foundational to mobile operators seeking to offer advanced 5G services with a low cost of production. Over the next two to three years, operators in all global regions will design, deploy, and scale 5G core networks on software-defined infrastructure. By April 2021, eight operators had already launched SA, according to the Global Mobile Suppliers Association (GSA), and a further 36 have firm plans to launch in the near term. There is now a good supply of devices that support SA mode, including the iPhone 12 after the latest iOS update.

Read More
news image

5G and the Future of Work

whitePaper | January 12, 2022

The world is becoming increasingly connected with advancements in wireless technology. Now in its fifth generation, 5G brings unprecedented speed, reliability, and responsiveness. As 5G wireless technology is further developed and brought to mainstream markets, it will catalyze a paradigm shift for how we connect with our devices, information, and one another. Verizon partnered with Gensler to explore how 5G will transform the way people work. We started by evaluating the critical capabilities and limitations of 5G. An analysis of 5G disruptions in tangential industries yielded five key emerging trends. Finally, by applying these trends to the workplace, we distilled specific implications that are most likely to shape the future of work.

Read More

Spotlight

Context Information Security

Context is an independently operated cyber security consultancy, founded in 1998 and focusing on providing highly skilled consultants to help organisations with their information security challenges. We work with some of the world’s most high profile blue chip companies and government organisations. Our broad service portfolio covers the areas of security penetration testing and assurance, incident response and investigations, and technical security research. We are certified by CESG and CPNI for the Cyber Incident Response scheme to help organisations respond effectively to sophisticated cyber security attacks. We helped to establish CREST and its associated standards, and, as a business, are a ‘Green Light’ CESG (CHECK) service provider.

Events