Mobility in 2015 and Beyond

Note: We have enjoyed RCR’s Wireless’ predictions segment on the upcoming year; sharing some of the predictions here for you.

Subscribers are using 4G LTE networks and consuming wireless data 14-times more than on non-4G networks, according to a recent Cisco Systems study. Today, a multitude of applications and devices are available to consume the mobile network, and service providers are challenged to deliver capabilities to meet subscriber expectations for access, availability and security. Wearables and smartphones will continue to flourish in 2015, meaning that advances in wireless LTE traffic management are top priorities for service providers.

Consumers have a voracious appetite and are adopting mobile technology trends with abandon. Two examples of advanced connectivity technologies are Bluetooth LE, which connects devices to a user’s personal network and the Internet, and near field communication, which now lets consumers use their smartphones to pay for purchases at the register.

Three key trends can help service providers deliver the technology to satisfy consumers’ ever-growing desire for mobile data.

Standardization and interoperability across Wi-Fi and LTE networks
Due to the increased performance of LTE and Wi-Fi networks, people are using their mobile devices to access content that was traditionally only accessed on high-speed broadband networks. Video streaming, social media and business applications are being accessed on mobile networks regularly due to the availability of high-speed mobile services via Wi-Fi and LTE. Consumers generally do not care about how the application is accessed as long as it is available.

Service providers need to integrate Wi-Fi and LTE access to provide a unified and transparent model for mobile connectivity. Unified authentication, security and reliability are all essential features subscribers expect with their mobile access. Such requirements become even more important as service providers deliver voice-over-LTE services and replace older circuit-switched voice services.

Mobile service providers will adopt a new security vision: multi-layer, “dynamic” security
The introduction of high-speed LTE mobile networks also brought a major change in network design. Because LTE networks are based on IP technology, they are vulnerable to all IP threats and security concerns of IP networks. New hacks and compromises are in the news on a daily basis, since hackers can penetrate a mobile network within a matter of days, if not hours, if it is not properly protected.What’s worse is that it may take months or longer to detect the hack or vulnerability.

To mitigate such threats, service providers need to create a dynamic, multilayer security policy that can deliver real-time detection and adjust security policies appropriately in multiple parts of the network. It is no longer feasible for them to protect their infrastructures using perimeter firewalls. As networks evolve toward virtualized environments with network function virtualization and software-defined networking, security must be applied based on application and service availability, not static network topology. Security management must incorporate the detection and corresponding mitigation by applying dynamic policies that can be delivered throughout disparate components within the LTE infrastructure.

To read more, please click here.