As 5G growth accelerates, CSPs have new opportunities for network differentiation and service growth

Despite the COVID-induced interruptions in the first half of 2020, 5G preparations and deployment continued in earnest in the second half of 2020 and now the market – vendors, CSPS, OEMs – are ready to bring 5G to the masses of users. The arrival of Apple’s first 5G devices in 4Q20 marked the tipping point of global consumer readiness, now extending from early-adopters. After the initial phase of network launches that saw coverage built-out in major urban centres, 5G service providers should now focus on expanding coverage to as many areas of high-data demand as possible. At the same time, as CSPs gauge their 5G roll-out strategies, they shouldn’t ignore rural areas with limited-to-no high-speed broadband coverage. In many markets, particularly developing ones, CSPs should carefully assess network-sharing as a way to cost-effectively tap pent-up demand, especially given the accelerating remote working trend.

Spotlight

CommTel Network Solutions

CommTel Network Solutions is an Australian owned company providing turnkey communications networks, both within Australia and internationally.

OTHER ARTICLES
Enterprise Mobility

5G vs. Wi-Fi 6: How Two Wireless Technologies are Revolutionizing the Internet of Things

Article | June 15, 2023

The year 2020 was supposed to be a breakthrough year for many technologies but, most businesses have now been forced back into building an infrastructure to transit their workforce to work remotely and ensure continuity of workflow. Nevertheless, an unprecedented set of events have pushed several industries to accelerate the adoption of technologies as they continue to work from home. 5G and Wi-Fi 6 are two tech advancements that have been turning eyes around the world since their introduction. The two wireless technologies are well on their way to revolutionize the Internet of Things as businesses move fast towards digitization and the world is excited. Table of Contents: - Wi-Fi 6: A Breakthrough in Wireless Technology - 5G: For a Better Connected World - How are Wi-Fi 6 and 5G Transforming the IoT? - 5G and Wi-Fi 6: Rivals or Allies? Wi-Fi 6: A Breakthrough in Wireless Technology The next-generation Wi-Fi with boosted speed was introduced last year to meet the demand for faster internet amongst the rising internet users. But, Wi-Fi 6 is simply more than a tweak in the speed. Technically called 802.11ax, Wi-Fi 6 is the advancement in the wireless standard doing the same basic things but with greater efficiency in the device-dense areas, and offering much greater bandwidth than its predecessor 802.11ac or Wi-Fi 5. Wi-Fi 6 promises a speed up to 9.6 Gbps up four times than that of Wi-Fi 5 (3.5Gbps). In reality, this is just a theoretical maximum that one is not expected to reach. Even still, the 9.6Gbps is higher speed and doesn’t have to go to a single device but split up across a network of devices. A new technology in Wi-Fi 6 called the Target Wake Time (TWT) lets routers set check-in times with devices, allowing communications between the router and the devices. The TWT also reduces the time required to keep the antennas powered to search for signals, which in turn also improves battery life. Wi-Fi 6 also comes with a new security protocol called WPA3, making it difficult to hack the device passwords by simple guesswork. In short, Wi-Fi 6 means better speeds with optimized battery lives, and improved security. 5G: For a Better Connected World 5G is the next in line to replace 4G LTE. While Wi-Fi covers small scale internet requirements, cellular networks like 5G are here to connect everyone and everything virtually on a larger scale. The technology is based on the Orthogonal frequency-division Multiplexing (OFDM) that reduces interference by modulating a digital signal across several channels. Ability to operate in both lower bands (like sub-6 GHz) and mmWave (24 GHz and above), 5G promises increased network capacity, low latency and multi-Gbps throughput. 5G also uses the new 5G NR air interface to optimize OFDM to deliver not just better user experience but also a wider one extending to many industries, and mission-critical service areas. The 5G technology, in a nutshell, has brought with it ultra-high speeds, increased and scalable network capacity, and very low latency. How are Wi-Fi 6 and 5G Transforming the IoT? 5G and Wi-Fi 6 will fill up the speed gaps that our existing networks are not able to especially, in crowded homes or congested urban areas. It's not just about the speed. The two wireless technologies will increase network capacity and improve signal strengths. On the business front, 5G and Wi-Fi 6 are both living up to the hype they created since their introduction. Wi-Fi 6 has emerged, as the enabler of converged IoT at the edge. It has put IT into OT applications, connected devices and processed data from devices such as IP security cameras, LED lighting, and digital signage with touch screen or voice command. Wi-Fi 6 can now be used in office buildings for intelligent building management systems, occupancy sensors, access control (smart locks), smart parking, and fire detection and evacuation. It’s (Wi-Fi 6) built for IoT. It will connect many, many more people to mobile devices, household appliances, or public utilities, such as the power grid and traffic lights. The transfer rates with Wi-Fi 6 are expected to improve anywhere from four times to 10 times current speeds, with a lower power draw, i.e. while using less electricity. - Tom Soderstrom, IT Chief Technology and Innovation Officer at NASA’s Jet Propulsion Laboratory (JPL) Similarly, 5G will open doors for more devices and data. It will increase the adoption of edge computing for faster data processing close to the point of action. The hype around 5G is because of the three key attributes it comes with: enhanced mobile broadband (eMBB), ultra-reliable low-latency (uRLLC), and massive IoT device connectivity (mMTC). But there is the fourth attribute that sets it apart from its predecessor: use of a spectrum that operates at the low-end frequency range (typically 600 MHz). Called as ‘low-band 5G’, it delivers high speeds with signals that go for miles without propagation losses and ability to penetrate obstacles. The 5G operates in the new millimetre-wave bands (24 to 86 GHz) delivering more capacity to enable many low-power IoT connections. If we were to point down the benefits, these two wireless technologies are bringing to the Internet of Things those would be: Increased Human-Device Interactions Increased Data and Devices More IoT investments Advancing to the Edge Acceleration towards Industrial IoT Enhanced use of IoT devices Better VUI 5G and Wi-Fi 6: Rivals or Allies? In February, Cisco estimated that by 2023 M2M communications will contribute to 50% or about 14.7 billion of all networked connections. Cisco’s Annual Internet Report reveals that 5G will enable new IoT applications with greater bandwidth and lower latencies and will accelerate innovations at scale. The same report estimates that 10.6% of global mobile connections in 2023 will be 5G, while Wi-Fi 6 hotspots will be 11.6% of all public Wi-Fi hotspots growing 13 times from 2020 through 2023. Wi-Fi6 will serve as a necessary complement to 5G. A significant portion of cellular traffic is offloaded to Wi-Fi networks to prevent congestion and degraded performance of cellular networks (due to demand). - Thomas Barnett, Director of Thought Leadership, Cisco Systems The two technologies are here to feed different data-hungry areas with gigabit speeds. With lower deployment costs, Wi-Fi 6 will be dominating the home and business environments where access points need to serve more users covering devices like smartphones, tablets, PCs, printers, TV sets, and streaming devices. With an unlicensed spectrum, the performance of Wi-Fi 6 depends on the number of users, that are using the network at the same time. 5G, with its longer range, will deliver mobile connections and accelerate smart city deployments and manufacturing operations. Like LTE, 5G speeds will depend upon users’ proximity to base stations and the number of people using that network. The performance of the two depends largely on the area where they are being deployed. For instance, Wi-Fi can very well handle machine-to-machine communications in a managed manufacturing unit, whereas 5G can enhance campus-wide manufacturing operations efficiently. Businesses will have a decision to make which among the two wireless networks fulfils their data appetite. In conclusion, the two wireless technologies continue to develop in parallel and causing the next big wave in the Internet of Things.

Read More
Data Center Networking

How to Increase Network Security with SD-WAN

Article | July 5, 2023

Network security today is losing the battle and a lot of it is blamed upon the traditional security devices. Imagine running next-gen IT Infrastructure secured by security tools made to secure legacy IT.Data breaches have increased substantially and IT professionals are continuously looking at new ways to improve their network security. In this scenario, SD-WAN emerges as one formidable option to implementthat will bolster your network security. Table of Contents: - What is SD-WAN? - How does SD-WAN work? - What are the main benefits of SD_WAN to network security? - What are the other advantages of SD-WAN? . Let’s dig into it. What is SD-WAN? SD-WAN stands for software-defined wide area network (or networking). A WAN is a connection between local area networks (LANs) separated by a substantial distance—anything from a few miles to thousands of miles. The term software-defined implies the WAN is programmatically configured and managed. So, it can be easily adapted quickly to meet changing needs. How does SD-WAN work? An SD-WAN connects end users to virtually any application, hosted at any location (e.g., in the public cloud or a company data center), via the best available or most feasible transport service, whether that’s an MPLS (Multiprotocol Label Switching), broadband, cellular or even satellite internet link. To deliver this level of flexibility and performance to users in digital workspaces, an SD-WAN utilizes a control function that continuously analyzes traffic flows across the WAN and intelligently directs traffic in accordance with current policies. Centralized control The primary means of control in an SD-WAN is centralized. It often resides in a SaaS application running on a public cloud. Control is decoupled from the hardware to simplify network management and improve the delivery of services. SD-WAN appliances (and virtual appliances) follow operational rules passed down from the central controller. This greatly reduces or eliminates the need to manage gateways and routers on an individual basis. Multi-connection, multi-transport SD-WAN gateways support hybrid WAN, which implies that each gateway can have multiple connections using different transports—MPLS, broadband Internet, LTE, etc. A virtual private network (VPN) is typically set up across each WAN connection for security. Consequently, the SD-WAN can be an overlay spanning a diverse communications infrastructure. Dynamic path selection Another feature of SD-WAN is dynamic path selection—the ability to automatically and selectively route traffic onto one WAN link or another depending on network conditions or traffic characteristics. Packets may be steered onto a particular link because another link is down or not working very well, or to balance network traffic across all available links. SD-WAN can also identify packets by application, user, source/destination, etc. and send them down one path or another based on those characteristics. Policy-based management Policy is what determines where dynamic path selection will steer traffic and what level of priority (quality of service, or QoS) it is given. Business intentions can be implemented as policies via the central management console. New and updated policies are translated into operational rules and downloaded to all SD-WAN gateways and routers under control. For example, to ensure the best performance for VoIP and interactive web conferences, a policy may be created by giving their packets transmission priority and routing them onto low-latency paths. Cost savings can be realized by sending file back-ups across a broadband Internet connection. WAN traffic that requires a high level of security can be restricted to private connections (e.g., MPLS) between sites and required to pass through a robust security stack when entering the enterprise. Service chaining SD-WAN has the ability chain itself together with other network services. WAN optimization (acceleration) is often combined with SD-WAN to improve network and application performance. Internet traffic leaving and entering a branch office may be routed across a VPN to a cloud-base security service to strike a balance between performance, security, and cost. Read more: GET THE MOST OUT OF YOUR SD-WAN: FEATURES YOU NEED TO START USING TODAY What are the main benefits of SD_WAN to network security? Eliminate VPN concerns One of the first areas in which SD-WAN impacts security is when a company uses the internet as a method of transport. Before SD-WAN came along and companies were using internet as a backup or even a primary transport method, they would build a VPN or a DMVPN to ensure secure transport of their traffic. This introduces a couple of issues, the first of which is this proliferation of VPNs that has to be managed. The company must have firewalls sitting at their data center, along with a VPN device or firewall sitting in the remote locations to be able to do these VPNs. Every site is dependent on the effort to be up on the network. - Hamza Seqqat, Director of Solutions Architecture, Apcela Failover is an issue with this VPN approach, he said. Companies can’t seamlessly failover from a fiber-based type of transport without having to strike some keys in between. It's hard and expensive to do seamless failover. “Now you don't have to have firewalls for VPNs. You don't have to worry about building your own VPNs or encrypting your traffic,” Seqqat said. “Every SD-WAN product comes with a controller that takes care of things seamlessly. That means there is this smart software-defined engine that builds all these IPsec tunnels between all the locations as soon as you plug the device in. You're not actually having to build a VPN—the controller does it automatically for you, so all you have to do is give the device an IP address or enable DHCP and let it pick an IP address from the DHCP server. Suddenly it's on the network and its building tunnels to all the sites.” He added that the SD-WAN controller builds a full mesh, so it can talk to every one of the sites without having to go back to the data center. This feature alone can reduce a company’s security footprint significantly because the site-to-site traffic becomes secure, easy, and seamless. Reduce traffic going through security A second significant benefit of SD-WAN that impacts security strategy is that it reduces the amount of traffic that needs to go through security parameters because all site-to-site traffic is encrypted. This makes security a bit easier to manage.“For a lot of companies, when they do VPNs for site-to-site traffic, they have to go through firewalls or some kind of encryption mechanism, and that increases their security footprint. It increases the complexity and the cost of security,” Seqqat said. “SD-WAN changes how traffic is routed through security.” Seqqat gave an example of a site that has a gig worth of bandwidth, and out of that gig of bandwidth, some traffic goes to the internet and some goes to site-to-site. “Without SD-WAN, generally you would have to run that whole gig through a firewall, and the firewall will split the traffic into what goes to the data center and what goes to the internet,” he said. “When you do SD-WAN, you don't have to do that. You can separate the traffic at the SD-WAN with a split tunnel, so you take half of the traffic and push it through the firewall to go to the internet and the other half goes straight site-to-site without having to go through a security parameter. Now you have a firewall to handle 500 megs as opposed to a gig, and that makes a huge difference because most security products are based on throughput and utilization. So, that can bring some cost benefits and ease management as well.” Security inherent to SD-WAN A third area where SD-WAN changes security strategy is the fact that certain security features can be implemented directly through the SD-WAN platform, which reduces costs and complexity in the actual security platform. “This depends on what aspects of security you're talking about,” Seqqat said. “For example, security is included in the Silverpeak SD-WAN product, so the Silverpeak devices really do most of the security for you. You don't have to deploy another firewall on top of that. With Versa’s SD-WAN, you can virtualize the firewall, so there’s no need to deploy physical firewalls.” For sites that simply need very basic security, SD-WAN has some inherent security capabilities. It can do things such as allow and deny certain sites and limit traffic that goes to certain sites. When you look at most SD-WAN products, you can usually kind of steer toward one or another based on your security requirements. Deploying SD-WAN in itself can really eliminate the need for security at several locations or extend the security you have been using. - Hamza Seqqat, Director of Solutions Architecture, Apcela Simplify use of security platforms In his final point, Seqqat said SD-WAN providers are making a lot of progress in partnering with both cloud security providers and cloud service providers. By making traffic encrypted and secure via SD-WAN, security platforms will only have to deal with public internet traffic. “SD-WAN providers are really working towards partnering and certifying different security products,” he said. “Consider Zscaler as an example. Some SD-WAN products automatically route all your traffic through Zscalar, which does a cloud-based security parameter before it goes out to the internet or to cloud service providers.” Seqqat said the most important part comes in the fact that Zscalar is distributed across 35 or 40 data centers that are all security parameters. “Making that routing decision as to what data center your traffic goes through before it goes out to the Internet is extremely important to performance,” he said. “If your Office 365 instance is hosted in Seattle and your users in Europe are trying to reach that, which Zscalar data center the traffic is going to go through before it goes through the Seattle instance of O365 makes all the difference in what latency is going to be at round trip. “SD-WAN provides somewhat of an automation and optimization of how traffic goes through Zscalar data centers based on performance metrics. SD-WAN can pull latency and jitter and packet loss and all that kind of stuff, so there is some intelligence that happens when a routing decision is being made as to where user traffic is going to go for security scrubbing or security features before it goes out to the cloud provider or to the Internet. That’s a huge feature that comes into play whenever you deploy SD-WAN.” Read more: FOR SERVICE PROVIDERS SD-WAN IS A MIXED BLESSING What are the other advantages of SD-WAN? SD-WAN has many advantages when implemented well: More predictable and reliable application performance, which helps support users in any digital workspace, across all connections. Superior connection security for cloud applications, without the performance tradeoffs of MPLS backhauling. Congestion reduction due to lack of bandwidth or brownouts with aggregation of bandwidth via multiple bonded and disparate or redundant links. More reliable access to apps and fewer slowdowns due to congestion. Resiliency and redundancy with fast failover when outages impact WAN connections. Quality of service for prioritizing business-critical application traffic. Fast deployments that fuel business agility when bringing applications online at a branch office, or simply changing the configurations. Zero-touch provisioning allows fast set up of sites in minutes with local staff instead of hours or days. Reduced network transport costs and more flexibility through the use of MPLS-alternatives like broadband and cellular. Quick procurement of bandwidth from multiple transport services, contrast to the long lead times needed with legacy WAN carrier-based technologies. Simplified administration with a centralized console eliminates the complexity of configuring edge devices in the field. Deep SD-WAN analytics to monitor links for performance characteristics. Analytics benefit administrators who can use them when troubleshooting problems across the WAN. Simpler branch office infrastructure that doesn’t require management of as many single-function devices Intelligent traffic steering and dynamic path selection Integrated security with leading 3rd-party solutions, including those for SaaS security Conclusion Interest in SD-WAN among organizations is on the rise, and we hope to see a tremendous rise in its adoption in network security strategies over the next few years. Vendor selection will be one of the factor for successful implementation of SD-WAN, as many are quickly developing new and effective software-defined platforms. An ideal vendor would be the one who effectively addresses your specific pain points and is able to meet your current as well as future requirements. Read more: SD-WAN SECURITY: THE IMPACT OF ORCHESTRATED SERVICES MULTIPLICITY

Read More
Wireless, 5G

Incumbent vendors cannot ignore the market-disrupting implications of AT&T’s and Swisscom’s outsourced 5G mobile cores

Article | May 18, 2023

At the tail-end of June, both AT&T and Swisscom announced plans to outsource their 5G mobile core networks to cloud service providers. AT&T’s announcement was with Microsoft Azure. Swisscom’s was with AWS. With the AT&T deal, Azure will be acquiring IP and engineering expertise from AT&T that it can resell to other operators. It was reported that Azure will offer jobs to current AT&T employees, as well. This move suggests Microsoft understands how critical it will be to retain talent that has deep networking knowledge. Swisscom’s deal does not appear to include AWS acquiring any Swisscom assets or employees, but the operator did say it will be using AWS for its own IT applications.

Read More
Wan Technologies

The 5G Enterprise Private Network: A Private Network for the Future

Article | August 23, 2022

In the United States, private networks saw the sun for the first time in the early 1970s by AT&T. The networks were majorly operated over telecommunication networks. In the 1990s, with the evolution of Internet technology, a new type of network known as virtual private networks emerged. This type of network was built on public infrastructure, and the data was encrypted to protect it from eavesdroppers. Nowadays, networks developed by businesses are called Enterprise Private Networks (EPN) when privacy is maintained via security processes and tunneling protocols such as Layer 2 Tunneling Protocol. The objective of an EPN is to provide high-speed internet access and data sharing within an organization. Businesses can utilize Wi-Fi in their workplaces to share internet access and resources. This type of private network also employs routers, switches, fiber optics, virtual devices, and modems. Security is also a significant factor while developing an enterprise network. Different firewalls are set at access points to ensure safe data transfer between systems. Enterprise private networks can be built in various ways, including: Virtual private network (VPN) Local area network (LAN) Wide area network (WAN) Cloud-based networks Let’s dive deeper into EPN. Enterprise Private Network: Reasons to Deploy It Today! Giving its intended objective, enterprise private networks can be considered to provide a variety of conceivable benefits to an organization. Enhancing Network Security A company must adhere to strict procedures to safeguard its security. Networks are vulnerable to cyberattacks, and some business data contains sensitive information that might be lost or acquired by the wrong people. However, data circulation is critical to long-term business operations, which is why incorporating an enterprise private network is a wonderful way to keep security issues at bay even while allowing the organization to more easily manage its critical operations. This is a key reason why most businesses do not hesitate to use EPN, regardless of how difficult it is to set up or the upfront costs associated with it. Economizing Measures Keeping overheads to a minimum is critical for achieving a convincing ROI at the end of the day. Most businesses take stringent steps to ensure that they remain profitable. Cutting major expenditures is a helpful technique to do this, and the deployment of EPN is a perfect example. Because important business data can be exchanged over the network where key stakeholders can access it, the expense of physically transferring data and resources from one place to another is reduced. Moreover, a significant amount of valuable time is saved since any type of data and resources can be uploaded across the network in a matter of minutes. Centralization Another important element that is essential to an organization's success is business continuity. Different departments of an organization are interconnected to one another through an enterprise private network and can effortlessly share resources with one another. As earlier stated, it enables time efficiency and allows companies to keep progressing toward gradually achieving their day-to-day demands. Enterprise Private Network: A Catalyst to 5G Digital Transformation Businesses now depend on technology that has undergone significant transformation in recent years. Organizations are increasingly relying on feature-rich apps to operate their operations and drive innovation. Connectivity is at the heart of keeping everything operating smoothly and effectively, and 5G is expected to provide even more pace and potential. 5G is enticing because its infrastructure differs from prior generations of cellular networks. The 3G and 4G networks were designed with hardware-based network operations in mind. 5G, on the other hand, is 'cloud-native,' with network functions stored in software as a Virtual Network Function (VNF) or Cloud-native Network Function (CNF). 5G has the ability to drive digital transformation for companies and organizations by providing faster connection speeds, reduced latency, higher capacity, and better security. Organizations can obtain significant business advantages in automation, security, and safety when 5G is used in combination with a private cellular network. The Importance of 5G on Private Networks Speed 5G provides better bandwidth than 4G LTE networks, which is critical for data-intensive applications. Latency Robotics, manufacturing, remotely operated systems, and vehicle-to-vehicle communications all need low latency. Network Slicing The 5G network core offers network slicing, allowing network operators to virtualize network traffic, often in a cloud-based flexible environment. Increased Connection Density 5G will ultimately support 100 times more connected devices per square kilometer, up to one million devices. Multi-Access Edge Computing (MEC) 5G Multi-Access Edge Computing (MEC) moves computational power closer to the network edge, reducing the time required to send data to a centralized data center. Wi-Fi 6 While 5G has considerable benefits over Wi-Fi, the new Wi-Fi 6 version also has greater capacity, reduced latency, and faster speeds than its predecessor, Wi-Fi 5. Industries Leveraging EPN to Enhance Their Capabilities With the expanding digital transformation, business interest in private networks is growing. Enterprises can deploy such networks to explore a broad range of wireless use cases and provide access to areas that are not covered by a public network. These networks can also be customized to meet the needs of certain industries and businesses. With the arrival of 5G, private networks enabled by the technology are positioned to stimulate innovation and allow next-generation enterprise transformation across a wide range of industries. Industries leveraging 5G-enabled enterprise private networks are: Healthcare Healthcare tops the list of rapidly growing industries, requiring private networks. The unprecedented burden caused on healthcare systems worldwide by the COVID-19 pandemic has driven the need for improved connectivity and modernization of infrastructure, prompting hospitals to establish private networks. Manufacturing The manufacturing industry is undergoing a significant digital transformation, which is enabling various new use cases like automated manufacturing. In the industrial arena, private 5G networks play a critical role in increasing the density and efficiency of automation technologies like collaborative mobile robots, automated guided vehicles, AR predictive maintenance, and virtual reality remote devices. Smart Facilities By reducing the reliance on third-party wireless service providers, private 5G networks enable these establishments to build and install the infrastructure most suited to their digital transformation roadmap. Logistics Another high-potential use case for private 5G networks is the logistics industry. With increasing global e-commerce adoption, the continuous movement of products through all logistical checkpoints—including warehouses, ports, and distribution centers—must be monitored and linked through a diverse variety of corporate mobility devices. Mining Another industry with significant potential for private 5G networks is mining. Mine operators want dependable wireless connections in order to leverage digital technologies, but they are often unable to introduce wireless communications to underground locations while still meeting the essential connectivity demands of machinery and mobile employees in open-pit locations. Private networks, which have fewer access points than Wi-Fi, can overcome these difficulties by providing a stable and widespread internet connection to machines, vehicles, and workers throughout a mine. This leads to improved safety, increased production, and a lower carbon footprint. Some of the other industries are Oil and gas, Education, Ports, Smart Cities, etc. Rising Demand for Enterprise Private Network (EPN) As per research analyst Leo Gergs from ABI Research, there are a couple of factors that are causing the surge in demand for private networks for enterprises. These factors are: Rise in demand for automation and enterprise digitalization in every sector of the market, including industrial manufacturing, logistics, oil and gas, etc., because of COVID-19. The private 5G network has arrived, bringing with it irresistible features and use cases for businesses from all industries. Private networks depend on technology from both public carrier networks and business IT, bringing together two disciplines that had previously evolved in quite distinct directions. Industry digitalization, the convergence of telecom and IT, edge migration of cloud apps, and increased spectrum availability are all combined to set the scenario for exploding demand for private 5G. A private 5G network is an enterprise-specific network that offers communication connections to people or items belonging to a single company as well as unique services required for the enterprise's operations. Enterprises across sectors are crunching the math on private 5G, from factories to farms to hospitals to hotels. According to ABI Research, heavy industrial verticals will increase demand for private network installations. Industrial manufacturing and energy production (including mining, oil and gas, and logistics) will contribute $32.38 billion in private network revenues by 2030, accounting for half of the $64 billion in total private network revenues. The need for private 5G networks is increasing as 5G arrives, allowing compelling business use cases and favorable legislative developments on spectrum availability for corporations. TBR projected that the market for private 5G networks would reach $7.5 billion by 2025, rising from $200 million in 2020. Carving the Future With every new cutting-edge technology comes a leap of faith. Businesses and industries can expedite their digital journeys by using 5G private networks to offer secure connections while gathering and managing huge amounts of business-critical data. Private 5G is not simply a new paradigm for network operators; it's also an incredible opportunity for public and private organizations to unleash efficiency, exploit real-time data, and boost revenue. FAQ How Does Enterprise Private Network Work? An enterprise private network is a business computer network that allows business organizations with several offices to securely connect to each other through a network. The primary purpose of an enterprise private network is to share system resources. How to Set Up Your Private 5G Network? To build a private 5G network, businesses need to: The first step is to get the spectrum right-to-use. Acquire 5G equipment such as base stations, mini-towers, and small cells from network equipment or infrastructure providers. Integrate equipment with edge devices like smartphones, routers, sensors, etc. What Is the Cost of Building a 5G Network? A modest tower and 5G cell site will cost between $30,000 and $50,000. If the wireless network is to function during a power failure, the cell site will also need commercial power and batteries.

Read More

Spotlight

CommTel Network Solutions

CommTel Network Solutions is an Australian owned company providing turnkey communications networks, both within Australia and internationally.

Related News

Network Security

Ampliphae, HPE Athonet and Arqit deliver Quantum-Safe Private 5G using Symmetric Key Agreement

PR Newswire | January 19, 2024

Arqit Quantum Inc, a leader in quantum-safe encryption, and Ampliphae Ltd (Ampliphae), a leader in network cyber security solutions, have today announced successful completion of a project that will deliver enhanced quantum-safe security for Private 5G networks. The Security Enhanced Virtualised Networking for 5G (SEViN-5G) project, funded by Innovate UK, the UK Government’s innovation agency, leveraged Ampliphae’s network security analytics technology and Arqit’s Symmetric Key Agreement Platform to deliver a quantum-secure Private 5G testbed that can protect against both current and future cyber threats. Athonet, a Hewlett Packard Enterprise acquisition, provided the Radio Access Network (RAN) equipment for the project with a cloud core hosted on AWS. Private enterprise networks based on 5G cellular technology are accelerating digital transformation across industries including manufacturing, healthcare, defence and smart cities. Private 5G gives enterprises access to high-speed, massively scalable, and ultra-reliable wireless connectivity, allowing them to implement innovative IoT and mobile solutions that enhance productivity, drive automation and improve customer engagement. The security of these networks will be paramount as they will support safety-critical infrastructure and carry highly sensitive data. But like any new technology, 5G comes with potential new threats and security risks including the threat from quantum computing. The project finished in December 2023 and customer engagement has already begun. David Williams, Arqit Founder, Chairman and CEO said: “Enterprises want to deploy Private 5G networks with complete confidence that they will be safe from both current and future cyber threats including from quantum computers. Working alongside Ampliphae, we have shown that a quantum-safe Private 5G network is deliverable using Arqit’s unique encryption technology.” Trevor Graham, Ampliphae CEO said: “Private 5G can be hosted partly or completely in the Cloud, giving enterprises the opportunity to rapidly set up their own cellular networks customised to support their operations. With Ampliphae and Arqit they can now be certain that those Private 5G networks are monitored and secure against eavesdropping and disruption.” Nanda Menon, Senior Advisor Hewlett Packard Enterprise said: “In an era where security is paramount, the completion of the SEViN-5G project is a significant milestone. The delivery of a quantum-secure Private 5G testbed, achieved where Athonet have combined the Athonet core with CableFree radios, underscores the commitment to innovation and reinforces the confidence enterprises can have in deploying networks that are both cutting-edge and secure from both present and future threats.” About Arqit Arqit Quantum Inc. (Nasdaq: ARQQ, ARQQW) (Arqit) supplies a unique encryption Platform as a Service which makes the communications links of any networked device, cloud machine or data at rest secure against both current and future forms of attack on encryption – even from a quantum computer. Compliant with NSA standards, Arqit’s Symmetric Key Agreement Platform delivers a lightweight software agent that allows devices to create encryption keys locally in partnership with any number of other devices. The keys are computationally secure and operate over zero trust networks. It can create limitless volumes of keys with any group size and refresh rate and can regulate the secure entrance and exit of a device in a group. The agent is lightweight and will thus run on the smallest of end point devices. The Product sits within a growing portfolio of granted patents. It also works in a standards compliant manner which does not oblige customers to make a disruptive rip and replace of their technology. Recognised for groundbreaking innovation at the Institution of Engineering and Technology awards in 2023, Arqit has also won the Innovation in Cyber Award at the National Cyber Awards and Cyber Security Software Company of the Year Award at the Cyber Security Awards. Arqit is ISO 27001 Standard certified. www.arqit.uk About Ampliphae Ampliphae’s distributed network analytics technology provides insight into how networks are used to support enterprise operations at every level. A graduate of the prestigious LORCA cyber accelerator in London, and the AWS European Defence Accelerator, Ampliphae’s technology is already used by enterprises across multiple verticals to discover, analyse and secure the network traffic that supports their key applications and business processes. Ampliphae’s Encryption Intelligence product operates at enterprise scale to discover devices and applications that use cryptography, analysing their encryption capabilities to detect risks, including assets that are vulnerable to future quantum computer attack. Using Encryption Intelligence, the organisation can gather effective operational intelligence about their encryption landscape, both within and outside the organisation, and build an effective mitigation program to address current and future vulnerabilities.

Read More

Network Security

Cato Networks Introduces World's First SASE-based XDR

PR Newswire | January 25, 2024

Cato Networks, the leader in SASE, announced the expansion of the Cato SASE Cloud platform into threat detection and incident response with Cato XDR, the world's first SASE-based, extended detection and response (XDR) solution. Available immediately, Cato XDR utilizes the functional and operational capabilities of the Cato SASE Cloud to overcome the protracted deployment times, limited data quality, and inadequate investigation and response experience too often associated with legacy XDR solutions. Cato also introduced Cato EPP, the first SASE-managed endpoint protection platform (EPP/EDR). Together, Cato XDR and Cato EPP mark the first expansion beyond the original SASE scope pioneered by Cato in 2016 and defined by industry analysts in 2019. SASE's security capabilities encompassed threat prevention and data protection in a common, easy-to-manage, and easy-to-adopt global platform. With today's announcement, Cato is expanding SASE into threat detection, incident response, and endpoint protection without compromising on the architectural elegance captured by the original SASE definition. "Cato SASE continues to be the antidote to security complexity," says Shlomo Kramer, CEO and co-founder of Cato Networks. "Today, we extend our one-of-a-kind SASE platform beyond threat prevention and into threat detection and response. Only Cato and our simple, automated, and elegant platform can streamline security this way." An early adopter of Cato XDR is Redner's Markets, an employee-owned supermarket chain headquartered in Reading, Pennsylvania, with 75 locations. Redner's Markets' vice president of IT and Infrastructure, Nick Hidalgo, said, "The Cato platform gave us better visibility, saved time on incident response, resolved application issues, and improved network performance ten-fold." (Read more about Redner's Markets and Cato in this blog. "The convergence of XDR and EPP into SASE is not just another product; it's a game-changer for the industry," said Art Nichols, CTO of Windstream Enterprise, a Cato partner. "The innovative integration of these capabilities brings together advanced threat detection, response capabilities, and endpoint security within a unified, cloud-native architecture—revolutionizing the way enterprises protect their networks and data against increasingly sophisticated cyber threats." (Read more about what Cato partners are saying about today's news in this blog.) Platform vs. Product: The Difference Matters Cato XDR takes full advantage of the enormous benefits of the Cato SASE Cloud platform, the first platform built from the ground up to enable enterprises to connect, secure, and manage sites, users, and cloud resources anywhere in the world. Unlike disjointed point solutions and security appliances, Cato capabilities are instantly on, always available at scale, and fully converged, giving IT teams a single, shared context worldwide to understand their networks, prevent threats, and resolve problems. As an autonomous platform, Cato SASE Cloud sustains its evolution, resiliency, optimal performance, and security posture, saving enterprises the operational overhead of maintaining enterprise infrastructure. Enterprises simply subscribe to Cato to meet their business needs. Cato's cloud-native model revolutionized security and networking operations when it was introduced in 2016, a fact validated three years later in 2019 when the Cato approach was formally recognized by the industry as SASE. Breach Times Still Too Long; Limitations of Legacy XDR Cato is again revolutionizing cybersecurity with the first SASE platform to expand into threat detection, empowering security teams to become smarter and remediate incidents faster. The flood of security alerts triggered by network sensors, such as firewalls and IPS, complicates threat identification. In 2023, enterprises required 204 days on average to identify breaches.1 XDR tools help security analysts close this gap by ingesting, correlating, and contextualizing threat intelligence information with the data from native and third-party sensors. However, legacy XDR tools suffer from numerous problems relating to data quality. Sensor deployment extends the time-to-value as IT must not only install the sensors but also develop a baseline of specific organizational activity for accurate assessments. Data quality is also compromised when importing and normalizing third-party sensor data, complicating threat identification and incident response. Security analysts waste time sorting through incident stories to identify the ones most critical for immediate remediation. Once determined, incident remediation is often hampered by missing information, requiring analysts to master and switch between disparate tools. No wonder in 2023, average breach containment required more than two months.1 Cato XDR and Cato EPP Expands the Meaning of SASE Cato XDR addresses legacy XDR's limitations. Instantly activated globally, Cato XDR provides enterprises with immediate insights into threats on their networks. Incident detection is accurate due to Cato's many native sensors – NGFW, advanced threat prevention (IPS, NGAM, and DNS Security), SWG, CASB, DLP, ZTNA, RBI, and now EPP/EDR. Powered by Bitdefender's world-leading malware prevention technology, Cato EPP protects endpoints from attack – in the Cato way. Endpoint threat and user data are stored in the same converged Cato data lake as the rest of the customer's network data, simplifying cross-domain event correlation. The result is incredibly high-quality data that improves the incident identification and remediation process. Cato AI uses the data to accurately identify and rank incidents, empowering analysts to focus critical resources on an organization's most important remediation cases. Cato AI is battle-tested and proven across years of threat hunting and remediation handling by Cato MDR service agents. Remediation times reduce as detected incident stories contain the relevant information for in-depth investigation. Cato's tools sit in the same console as the native engines, enabling security analysts to view everything in one place -- the current security policy and the reviewed story. Finally, incident reporting is simplified with generative AI. Purpose-built for investigations, this natural language engine provides human-readable explanations of incident stories. Analysts save time sharing incident information with other teams and reporting to their managers.

Read More

Network Infrastructure

DISH Wireless Awarded $50 Million NTIA Grant for 5G Open RAN Integration and Deployment Center

PR Newswire | January 16, 2024

DISH Wireless, a subsidiary of EchoStar, was awarded a historic $50 million grant from the U.S. Department of Commerce's National Telecommunications and Information Administration (NTIA) to establish the Open RAN Center for Integration & Deployment (ORCID). ORCID will allow participants to test and validate their hardware and software solutions (RU, DU and CU) against a complete commercial-grade Open RAN network deployed by DISH. "The Open RAN Center for Integration and Deployment (ORCID) will serve a critical role in strengthening the global Open RAN ecosystem and building the next generation of wireless networks," said Charlie Ergen, co-founder and chairman, EchoStar. "By leveraging DISH's experience deploying the world's first standalone Open RAN 5G network, ORCID will be uniquely positioned to test and evaluate Open RAN interoperability, performance and security from domestic and international vendors. We appreciate NTIA's recognition of DISH and ORCID's role in driving Open RAN innovation and the Administration's ongoing commitment to U.S. leadership in wireless connectivity." To date, this grant represents NTIA's largest award under the Public Wireless Supply Chain Innovation Fund (Innovation Fund). ORCID will be housed in DISH's secure Cheyenne, Wyoming campus and will be supported by consortium partners Fujitsu, Mavenir and VMware by Broadcom and technology partners Analog Devices, ARM, Cisco, Dell Technologies, Intel, JMA Wireless, NVIDIA, Qualcomm and Samsung. NTIA Administrator Alan Davidson and Innovation Fund Director Amanda Toman will join EchoStar Co-Founder and Chairman Charlie Ergen, EchoStar CEO Hamid Akhavan, EVP and Chief Network Officer Marc Rouanne and other stakeholders to announce the grant and tour a DISH 5G Open RAN cell site later today in Las Vegas. During this event, DISH will outline ORCID's unique advantages, including that it will leverage DISH's experience as the only operator in the United States to commercially deploy a standalone Open RAN 5G network. DISH and its industry partners have validated Open RAN technology at scale across the country; today DISH's network covers over 246 million Americans nationwide. At ORCID, participants will be able to test and evaluate individual or multiple network elements to ensure Open RAN interoperability, performance and security, and contribute to the development, deployment and adoption of open and interoperable standards-based radio access networks. ORCID's "living laboratory" will drive the Open RAN ecosystem — from lab testing to commercial deployment. Below are highlights of ORCID: ORCID will combine both lab and field testing and evaluation activities. ORCID will be able to test elements brought by any qualified vendor against DISH's live, complete and commercial-grade Open RAN stack. ORCID will use DISH's spectrum holdings, a combination of low-, mid- and high-band frequencies, enabling field testing and evaluation. ORCID will evaluate Open RAN elements through mixing and matching with those of other vendors, rather than validating a single vendor's stack. DISH's experience in a multi-vendor environment will give ORCID unique insights about the integration of Open RAN into brownfield networks. ORCID's multi-tenant lab and field testing will occur in DISH's secure Cheyenne, Wyoming facility, which is already compliant with stringent security protocols in light of its satellite functions. About DISH Wireless DISH Wireless, a subsidiary of EchoStar Corporation (NASDAQ: SATS), is changing the way the world communicates with the Boost Wireless Network. In 2020, the company became a nationwide U.S. wireless carrier through the acquisition of Boost Mobile. The company continues to innovate in wireless, building the nation's first virtualized, Open RAN 5G broadband network, and is inclusive of the Boost Infinite, Boost Mobile and Gen Mobile wireless brands.

Read More

Network Security

Ampliphae, HPE Athonet and Arqit deliver Quantum-Safe Private 5G using Symmetric Key Agreement

PR Newswire | January 19, 2024

Arqit Quantum Inc, a leader in quantum-safe encryption, and Ampliphae Ltd (Ampliphae), a leader in network cyber security solutions, have today announced successful completion of a project that will deliver enhanced quantum-safe security for Private 5G networks. The Security Enhanced Virtualised Networking for 5G (SEViN-5G) project, funded by Innovate UK, the UK Government’s innovation agency, leveraged Ampliphae’s network security analytics technology and Arqit’s Symmetric Key Agreement Platform to deliver a quantum-secure Private 5G testbed that can protect against both current and future cyber threats. Athonet, a Hewlett Packard Enterprise acquisition, provided the Radio Access Network (RAN) equipment for the project with a cloud core hosted on AWS. Private enterprise networks based on 5G cellular technology are accelerating digital transformation across industries including manufacturing, healthcare, defence and smart cities. Private 5G gives enterprises access to high-speed, massively scalable, and ultra-reliable wireless connectivity, allowing them to implement innovative IoT and mobile solutions that enhance productivity, drive automation and improve customer engagement. The security of these networks will be paramount as they will support safety-critical infrastructure and carry highly sensitive data. But like any new technology, 5G comes with potential new threats and security risks including the threat from quantum computing. The project finished in December 2023 and customer engagement has already begun. David Williams, Arqit Founder, Chairman and CEO said: “Enterprises want to deploy Private 5G networks with complete confidence that they will be safe from both current and future cyber threats including from quantum computers. Working alongside Ampliphae, we have shown that a quantum-safe Private 5G network is deliverable using Arqit’s unique encryption technology.” Trevor Graham, Ampliphae CEO said: “Private 5G can be hosted partly or completely in the Cloud, giving enterprises the opportunity to rapidly set up their own cellular networks customised to support their operations. With Ampliphae and Arqit they can now be certain that those Private 5G networks are monitored and secure against eavesdropping and disruption.” Nanda Menon, Senior Advisor Hewlett Packard Enterprise said: “In an era where security is paramount, the completion of the SEViN-5G project is a significant milestone. The delivery of a quantum-secure Private 5G testbed, achieved where Athonet have combined the Athonet core with CableFree radios, underscores the commitment to innovation and reinforces the confidence enterprises can have in deploying networks that are both cutting-edge and secure from both present and future threats.” About Arqit Arqit Quantum Inc. (Nasdaq: ARQQ, ARQQW) (Arqit) supplies a unique encryption Platform as a Service which makes the communications links of any networked device, cloud machine or data at rest secure against both current and future forms of attack on encryption – even from a quantum computer. Compliant with NSA standards, Arqit’s Symmetric Key Agreement Platform delivers a lightweight software agent that allows devices to create encryption keys locally in partnership with any number of other devices. The keys are computationally secure and operate over zero trust networks. It can create limitless volumes of keys with any group size and refresh rate and can regulate the secure entrance and exit of a device in a group. The agent is lightweight and will thus run on the smallest of end point devices. The Product sits within a growing portfolio of granted patents. It also works in a standards compliant manner which does not oblige customers to make a disruptive rip and replace of their technology. Recognised for groundbreaking innovation at the Institution of Engineering and Technology awards in 2023, Arqit has also won the Innovation in Cyber Award at the National Cyber Awards and Cyber Security Software Company of the Year Award at the Cyber Security Awards. Arqit is ISO 27001 Standard certified. www.arqit.uk About Ampliphae Ampliphae’s distributed network analytics technology provides insight into how networks are used to support enterprise operations at every level. A graduate of the prestigious LORCA cyber accelerator in London, and the AWS European Defence Accelerator, Ampliphae’s technology is already used by enterprises across multiple verticals to discover, analyse and secure the network traffic that supports their key applications and business processes. Ampliphae’s Encryption Intelligence product operates at enterprise scale to discover devices and applications that use cryptography, analysing their encryption capabilities to detect risks, including assets that are vulnerable to future quantum computer attack. Using Encryption Intelligence, the organisation can gather effective operational intelligence about their encryption landscape, both within and outside the organisation, and build an effective mitigation program to address current and future vulnerabilities.

Read More

Network Security

Cato Networks Introduces World's First SASE-based XDR

PR Newswire | January 25, 2024

Cato Networks, the leader in SASE, announced the expansion of the Cato SASE Cloud platform into threat detection and incident response with Cato XDR, the world's first SASE-based, extended detection and response (XDR) solution. Available immediately, Cato XDR utilizes the functional and operational capabilities of the Cato SASE Cloud to overcome the protracted deployment times, limited data quality, and inadequate investigation and response experience too often associated with legacy XDR solutions. Cato also introduced Cato EPP, the first SASE-managed endpoint protection platform (EPP/EDR). Together, Cato XDR and Cato EPP mark the first expansion beyond the original SASE scope pioneered by Cato in 2016 and defined by industry analysts in 2019. SASE's security capabilities encompassed threat prevention and data protection in a common, easy-to-manage, and easy-to-adopt global platform. With today's announcement, Cato is expanding SASE into threat detection, incident response, and endpoint protection without compromising on the architectural elegance captured by the original SASE definition. "Cato SASE continues to be the antidote to security complexity," says Shlomo Kramer, CEO and co-founder of Cato Networks. "Today, we extend our one-of-a-kind SASE platform beyond threat prevention and into threat detection and response. Only Cato and our simple, automated, and elegant platform can streamline security this way." An early adopter of Cato XDR is Redner's Markets, an employee-owned supermarket chain headquartered in Reading, Pennsylvania, with 75 locations. Redner's Markets' vice president of IT and Infrastructure, Nick Hidalgo, said, "The Cato platform gave us better visibility, saved time on incident response, resolved application issues, and improved network performance ten-fold." (Read more about Redner's Markets and Cato in this blog. "The convergence of XDR and EPP into SASE is not just another product; it's a game-changer for the industry," said Art Nichols, CTO of Windstream Enterprise, a Cato partner. "The innovative integration of these capabilities brings together advanced threat detection, response capabilities, and endpoint security within a unified, cloud-native architecture—revolutionizing the way enterprises protect their networks and data against increasingly sophisticated cyber threats." (Read more about what Cato partners are saying about today's news in this blog.) Platform vs. Product: The Difference Matters Cato XDR takes full advantage of the enormous benefits of the Cato SASE Cloud platform, the first platform built from the ground up to enable enterprises to connect, secure, and manage sites, users, and cloud resources anywhere in the world. Unlike disjointed point solutions and security appliances, Cato capabilities are instantly on, always available at scale, and fully converged, giving IT teams a single, shared context worldwide to understand their networks, prevent threats, and resolve problems. As an autonomous platform, Cato SASE Cloud sustains its evolution, resiliency, optimal performance, and security posture, saving enterprises the operational overhead of maintaining enterprise infrastructure. Enterprises simply subscribe to Cato to meet their business needs. Cato's cloud-native model revolutionized security and networking operations when it was introduced in 2016, a fact validated three years later in 2019 when the Cato approach was formally recognized by the industry as SASE. Breach Times Still Too Long; Limitations of Legacy XDR Cato is again revolutionizing cybersecurity with the first SASE platform to expand into threat detection, empowering security teams to become smarter and remediate incidents faster. The flood of security alerts triggered by network sensors, such as firewalls and IPS, complicates threat identification. In 2023, enterprises required 204 days on average to identify breaches.1 XDR tools help security analysts close this gap by ingesting, correlating, and contextualizing threat intelligence information with the data from native and third-party sensors. However, legacy XDR tools suffer from numerous problems relating to data quality. Sensor deployment extends the time-to-value as IT must not only install the sensors but also develop a baseline of specific organizational activity for accurate assessments. Data quality is also compromised when importing and normalizing third-party sensor data, complicating threat identification and incident response. Security analysts waste time sorting through incident stories to identify the ones most critical for immediate remediation. Once determined, incident remediation is often hampered by missing information, requiring analysts to master and switch between disparate tools. No wonder in 2023, average breach containment required more than two months.1 Cato XDR and Cato EPP Expands the Meaning of SASE Cato XDR addresses legacy XDR's limitations. Instantly activated globally, Cato XDR provides enterprises with immediate insights into threats on their networks. Incident detection is accurate due to Cato's many native sensors – NGFW, advanced threat prevention (IPS, NGAM, and DNS Security), SWG, CASB, DLP, ZTNA, RBI, and now EPP/EDR. Powered by Bitdefender's world-leading malware prevention technology, Cato EPP protects endpoints from attack – in the Cato way. Endpoint threat and user data are stored in the same converged Cato data lake as the rest of the customer's network data, simplifying cross-domain event correlation. The result is incredibly high-quality data that improves the incident identification and remediation process. Cato AI uses the data to accurately identify and rank incidents, empowering analysts to focus critical resources on an organization's most important remediation cases. Cato AI is battle-tested and proven across years of threat hunting and remediation handling by Cato MDR service agents. Remediation times reduce as detected incident stories contain the relevant information for in-depth investigation. Cato's tools sit in the same console as the native engines, enabling security analysts to view everything in one place -- the current security policy and the reviewed story. Finally, incident reporting is simplified with generative AI. Purpose-built for investigations, this natural language engine provides human-readable explanations of incident stories. Analysts save time sharing incident information with other teams and reporting to their managers.

Read More

Network Infrastructure

DISH Wireless Awarded $50 Million NTIA Grant for 5G Open RAN Integration and Deployment Center

PR Newswire | January 16, 2024

DISH Wireless, a subsidiary of EchoStar, was awarded a historic $50 million grant from the U.S. Department of Commerce's National Telecommunications and Information Administration (NTIA) to establish the Open RAN Center for Integration & Deployment (ORCID). ORCID will allow participants to test and validate their hardware and software solutions (RU, DU and CU) against a complete commercial-grade Open RAN network deployed by DISH. "The Open RAN Center for Integration and Deployment (ORCID) will serve a critical role in strengthening the global Open RAN ecosystem and building the next generation of wireless networks," said Charlie Ergen, co-founder and chairman, EchoStar. "By leveraging DISH's experience deploying the world's first standalone Open RAN 5G network, ORCID will be uniquely positioned to test and evaluate Open RAN interoperability, performance and security from domestic and international vendors. We appreciate NTIA's recognition of DISH and ORCID's role in driving Open RAN innovation and the Administration's ongoing commitment to U.S. leadership in wireless connectivity." To date, this grant represents NTIA's largest award under the Public Wireless Supply Chain Innovation Fund (Innovation Fund). ORCID will be housed in DISH's secure Cheyenne, Wyoming campus and will be supported by consortium partners Fujitsu, Mavenir and VMware by Broadcom and technology partners Analog Devices, ARM, Cisco, Dell Technologies, Intel, JMA Wireless, NVIDIA, Qualcomm and Samsung. NTIA Administrator Alan Davidson and Innovation Fund Director Amanda Toman will join EchoStar Co-Founder and Chairman Charlie Ergen, EchoStar CEO Hamid Akhavan, EVP and Chief Network Officer Marc Rouanne and other stakeholders to announce the grant and tour a DISH 5G Open RAN cell site later today in Las Vegas. During this event, DISH will outline ORCID's unique advantages, including that it will leverage DISH's experience as the only operator in the United States to commercially deploy a standalone Open RAN 5G network. DISH and its industry partners have validated Open RAN technology at scale across the country; today DISH's network covers over 246 million Americans nationwide. At ORCID, participants will be able to test and evaluate individual or multiple network elements to ensure Open RAN interoperability, performance and security, and contribute to the development, deployment and adoption of open and interoperable standards-based radio access networks. ORCID's "living laboratory" will drive the Open RAN ecosystem — from lab testing to commercial deployment. Below are highlights of ORCID: ORCID will combine both lab and field testing and evaluation activities. ORCID will be able to test elements brought by any qualified vendor against DISH's live, complete and commercial-grade Open RAN stack. ORCID will use DISH's spectrum holdings, a combination of low-, mid- and high-band frequencies, enabling field testing and evaluation. ORCID will evaluate Open RAN elements through mixing and matching with those of other vendors, rather than validating a single vendor's stack. DISH's experience in a multi-vendor environment will give ORCID unique insights about the integration of Open RAN into brownfield networks. ORCID's multi-tenant lab and field testing will occur in DISH's secure Cheyenne, Wyoming facility, which is already compliant with stringent security protocols in light of its satellite functions. About DISH Wireless DISH Wireless, a subsidiary of EchoStar Corporation (NASDAQ: SATS), is changing the way the world communicates with the Boost Wireless Network. In 2020, the company became a nationwide U.S. wireless carrier through the acquisition of Boost Mobile. The company continues to innovate in wireless, building the nation's first virtualized, Open RAN 5G broadband network, and is inclusive of the Boost Infinite, Boost Mobile and Gen Mobile wireless brands.

Read More

Events