Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Monday, 6 February, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

2019 Predictions And The Start Of 5G.

by The Gurus
January 14, 2019
in Opinions & Analysis
2019 Predictions And The Start Of 5G.
Share on FacebookShare on Twitter

By Ronald Sens, EMEA Director at A10 Networks

With 2019 well underway, the hype of 5G and the growth of IoT are filling my thoughts, with both – especially the fifth generation of mobile networks – in a relatively early stage. So, how will 5G and IoT develop in the New Year?

First Operational 5G Networks
This year is expected to see the first operational 5G networks become available in selected areas. However, the iteration of mobile network technology won’t fully replace existing 3G and 4G networks, leaving many of us questioning what 5G’s real benefits will be, and how much extra will it cost?

As previously, when new generations of networks have been introduced, 5G will need to coexist with existing networks to support all subscribers and the broad diversity of the installed base. This presents an opportunity for service providers to review and adjust their strategy, based on lessons learned during the earlier deployments of what worked best for their customers.

Radio Access Networks Continue to Evolve
The Radio Access Network (RAN) continues to evolve. This will drive increasingly flexible deployment options. Associated methods of support will be based on Software Defined Networks (SDN), or as some call it ‘self-driven networks’, using a mix of Virtualised Network Functions (VNF). This evolution of legacy hardware into software defined functions continues the development of architectural changes.

In many instances the architectural focus is in the balance of two things:

How to best utilise more of the common platforms to help drive down the overall deployment costs tied to new technology.
The associated performance the newer and faster dedicated hardware brings to the equation.

Network Operations Continue to Evolve
More hardware will be needed to handle the adoption of SDN and VNF. This will drive even more network advancements that will then require even more software. The continued cyclic evolution and shift to a more rapid deployment will drive an increasing need for DevOps. Expect to hear more about Continuous Integration and Continuous Delivery, concepts that have gained attention in the development of cloud.

The development and integration of complexities will increase operational overhead before simplifications of networks can start to be realised. The operational complexities, if not managed through self-healing and the use of intelligence, could delay uptake as the evolution of network operations is just as important as the network itself.

Virtualisation Continues to Evolve
Last year saw many of the service providers focus more effort on investing in resources as the shift from “old iron” to the more flexible virtualised environments hastened. The shift is part of the bigger movement associated with decentralisation, consisting of deploying smaller but more capable systems to handle the increasing traffic. This is not a new trend as network tonnage continues to grow no matter what kind of carrier is supporting it. The tonnage increase continues as more and more devices become available and this becomes the basis for Internet of Things (IoT).

5G Network Continues to Scale Out
As 2019 progresses, subscribers will see 5G progress from conversation to actually supporting a limited quantity of customers. Mobile subscribers will need to obtain new devices. The work done by RAN and RF manufacturers will move from prototypes into commercial products at an increasing pace.

Debate of Hardware vs. Software
5G drives increasing scale throughout all parts of a network, at the same time changing to decentralise many components of the infrastructure. The decentralisation is forcing trade-offs between high-performance purpose-built hardware and the use of software defined solutions.

The trade-offs and costs will remain hot topics for years to come as custom hardware remains a leader in many instances. Virtualisation will move further ahead into containers and orchestrations to knit cooperative suppliers into a cohesive scaled solution.

Radio Spectrum and Government Regulations
Talks regarding radio spectrum, who has what frequencies, and how they should be used, will keep governments around the world occupied. Wi-Fi offload and interconnects between public and private networks will continue to improve coverage.

The story of wireless mobility coverage will be a very interesting topic to watch unfold. 5G deployment topologies will fight to cover every inch of the major populations. Rural areas will have the most to gain.

Subscriber Growth Slows, Connected Devices Increases
Subscriber counts will not go up as much as in years past. Saturation of connected individuals is reaching an all-time high although the count of connected devices will increase at a more rapid pace, as the IoT expands.

DDoS Attacks Grow in Frequency and Size
With the increase of IoT, DDoS attacks will grow in frequency and scale. More devices going on-line places even more pressure on service providers to increase their ability to combat DDoS attacks.

Mobile Micro-Clouds in Containers
Look for the development of small cloud datacentres located at the edge of the internet, also known as cloudlets or mobile micro-clouds. This ‘edge’ or ‘fog’ computing model is an extension of existing cloud infrastructure. They will improve the latency of services for mobile devices.

The adoption of 5G creates the demand to offload resource-intensive services to the network’s edge. Cloudlet deployments will have to be very agile, so they can be quickly provisioned to adapt to a rapidly changing market. Because of this, they’ll be based in the container architecture.

As the network model evolves, so too do the opportunities for innovation and threats from disruptors. 2019 promises to be yet another fascinating year in the network world.

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

If Cybersecurity Breaches Are Inevitable What Should Organisations Do About It?

Next Post

Surfshark Triumphs At BestVPN.com Awards 2019 Ceremony In Las Vegas.

Recent News

safe

Will Emphasising App Security Lead to More App Installs?

February 6, 2023
Phone with app store open

$400,000 Fine for Stalkerware App Developer

February 6, 2023
london-skyline-canary-wharf

Ransomware attack halts London trading

February 3, 2023
Ransomware conversations: Why the CFO is pivotal to discussing and preparing for risk

Ransomware conversations: Why the CFO is pivotal to discussing and preparing for risk

February 2, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information