Nokia lays groundwork for next-gen virtualized mobile networks
The company demonstrated that virtualization and cloud-based infrastructure can help combat network congestion
IDG News Service - Nokia Solutions and Networks (NSN) and Korean operator SK Telecom have demonstrated the potential for virtualizing the core of a mobile network, which will make it easier for operators to roll out new services.
Virtualization and cloud-based services have changed enterprise systems' architecture and management. Mobile operators' desire for the same advantages in their networks has given rise to the concept of NFV (network functions virtualization).
The goal is to move away from the proprietary and expensive equipment operators use today and instead adopt a more cloud-based infrastructure that allows them to be more flexible and use commodity hardware. That could, in turn, allow operators to cut costs and roll out services faster, according to Nokia, and that should be a boon for users, as well.
Moving to a whole new way of building the networks operators rely on to offer telephony and mobile broadband isn't going to happen overnight. But even if it's still early days, vendors have to show they are current with this idea, according to Sylvain Fabre, research director at Gartner.
Nokia and SK Telecom's joint proof-of-concept focused on virtualizing the so-called Evolved Packet Core (EPC), and they were able to successfully control capacity for both throughput and signaling traffic based on smartphone usage patterns, Nokia said Monday.
SK Telecom is not the only vendor interested in NFV. Last year representatives from 13 operators -- including Verizon, China Mobile and Deutsche Telekom -- came together to write a white paper on the topic.
Because there is great interest from operators, the vendors can't ignore NFV even if a move to a more open network would open the door for new competitors in the network infrastructure sector, according to Fabre.
Send news tips and comments to firstname.lastname@example.org
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Logicalis eBook: SAP HANA: The Need for Speed Without timely business insights, organizations today can suffer logistical, manufacturing, and even financial disaster in a matter of minutes
- Neustar 2014 DDoS Attacks and Impact Report For the third consecutive year, Neustar surveyed hundreds of companies on distributed denial of service (DDoS) attacks. The survey reveals evidence that the...
- Acxiom Case Study This case study, which focuses on Acxiom, explores how the company was able to secure employee data, reduce migration costs and boost productivity...
- Windows® XP Migration: Protect and Secure Critical Data With the end of the Microsoft Windows XP operating system's lifecycle on April 8, 2014, businesses are faced with the decision to migrate...
- Top 4 Digital Signage Fails Join RMG Networks for a look at four of the most common reasons digital signage fails in corporate businesses. Learn about strategies to...
- Building Tomorrow's Infrastructure Listen to this podcast to discover how Crider Foods worked with PC Connection to update their IT infrastructure, while maintaining compliance and control. All Wireless Carriers White Papers | Webcasts
Our new weekly Consumerization of IT newsletter covers a wide range of trends including BYOD, smartphones, tablets, MDM, cloud, social and what it all means for IT. Subscribe now and stay up to date!