This white paper reviews the finding of recent Heavy Reading research into wireless CSP attitudes to and plans for driving customer loyalty through control of network service quality. It discusses the features needed in a next-generation CEM solution that will support a real-time understanding of the impact of the network on individual customers' experience, enabling CSPs to take appropriate actions to maintain both loyalty and profitability.
This paper adopts the MEF's LSO terminology and explores LSO's purpose, relationship with ETSI NFV MANO and required set of capabilities.
In an exclusive study for ARRIS, Heavy Reading sought to determine where pay TV providers stand with multiscreen video today, and where they plan to take it over the next few years. The study looks at how much multiscreen video usage service providers are seeing from their customers and how providers plan to monetize their multiscreen offerings.
Huawei Technologies is using Mobile World Congress 2015 as a venue for making a number of announcements regarding new solutions and product updates. This paper examines five areas that Huawei is focusing on.
The paper discusses the various attributes and capabilities that a product needs to possess to be successful in the rapidly growing IoT market. It also talks about how a distributed architecture can be leveraged for successful IoT deployments.
This white paper explores the benefits of deploying a telecom cloud infrastructure for both carriers and their customers and examines the changes in modular platform development required to meet the demands of virtualized environments.
The agile and automated management of virtualized network functions (VNFs) throughout their lifecycles is a key goal for network functions virtualization (NFV). This white paper focuses on the first phase of the VNF lifecycle: the agile deployment and fulfillment of VNFs in the cloud.
Hyperscale cloud has been developed by the Internet giants to support the creation and delivery of software-based services at blistering speed, and at the lowest possible cost. Since software is the foundation for service innovation in the 21st century, those players that master this capability will eat markets - the achievement to date of Amazon, Google, Facebook, et al.
Light Reading asked the European Advanced Networking Test Center to visit Cisco Systems in San Jose, put itself in the shoes of a CSP and conduct a series of validation and verification exercises on a number of Cisco cloud, SDN and virtualization platforms. Read the EANTC team's blow-by-blow account of how they analyzed, verified and used Cisco's technology in the same way as a network operator team, and the results of their findings.
Service provider networks are complex and heterogeneous. As a result, service providers have unique requirements for securing their networks. This solution brief outlines questions service providers must ask when evaluating Identity Access Management strategies and approaches.
This whitepaper is a primer for anyone wanting to explore the evolution path of LTE and the key capabilities introduced by evolving standards that define LTE Advanced. It discusses the versions that have been introduced into the market, explores their advantages and history, and the regions where they are gaining traction.
This report provides some insights into the opportunities and challenges facing mobile operators today based on the presentations given, and discussions had, at this year's MWC. We hope you find it of interest.
When deploying LTE networks, service providers must deliver a robust messaging infrastructure, implement advanced roaming policies, and adhere to regulations-all while managing costs.
The Diameter protocol is a peer-to-peer protocol enabling IMS and LTE (and some 3G) network elements to communicate. As LTE networks begin to deploy and grow, a key challenge is scaling the signaling and control plane due to the increasing number of Diameter messages passing among network elements. A host of products incorporating DRA and DEA functionality have been developed to address the scaling of the all-IP signaling and control plane.
Network functions virtualization (NFV) has made remarkable progress on many fronts. This includes market acceptance, architecture definition and supporting specifications. This whitepaper focuses on this topic, examining NFV implementation requirements as well as common tips and traps that operators must consider as they move head-long into the NFV implementation phase.
How do you achieve the most reliable Network Functions Virtualization (NFV) infrastructure available? Wind River(R) Titanium Server guarantees 99.9999% (six nines) reliability, and this white paper explains how.
Virtualization by itself is not enough to deliver the full potential and value of the NFV architecture. Service provider costs and complexity increase with virtualization alone. Realizing the benefits of NFV requires a management and orchestration system to enable an adaptive network infrastructure.
For a number of years, service and content providers have sought the best way to make the dream of multiscreen video a reality by streaming live video, on-demand content and Internet video programming to laptops, connected TVs, tablets, game consoles, smartphones and other video-capable devices. The next-generation technology designed to overcome these hurdles is adaptive bit-rate (ABR) streaming over HTTP.
This white paper discusses the new operational requirements for NFV and argues that operators cannot afford to apply these simply to VNFs, in isolation from the rest of the network. It looks at the need for a next-generation OSS stack that can converge virtual and physical network operations, based on a common service model and common capabilities. It suggests a starting point for such a transformation and a key area of focus.
This white paper explores the requirements for delivering line-speed performance in a virtual infrastructure environment and reviews an exciting solution to this challenge that is based on a 2U chassis with four Intel(R) Xeon(R) series processors.
Service chaining is an emerging set of technologies and processes that enable operators to configure network services dynamically in software without having to make changes to the network at the hardware level. By routing traffic flows according to a "service graph," service chaining addresses the requirement for both optimization of the network, through better utilization of resources; and monetization, through the provisioning of services that are tailored to the customer context.