Telcos or Communication Service Providers (CSP) are in the midst of a tremendous transformation of their networks, driven by customer demand, competitive forces, and margin pressures. The European Telecommunications Standards Institute (ETSI) has proposed a generic architecture to virtualize this network. VMWare provides a key component of this architecture, but will have to work with an entire ecosystem of vendors to realize this architecture.
This is an intermediate level course that builds on participant’s knowledge of VoLTE and the IMS architecture. Participants analyze real-world VoLTE/SIP logs collected from commercial VoLTE networks. Participants analyze SIP signaling messages in the IMS domain. This course uses a scenario- based approach, allowing participants to step through key scenarios such as VoLTE registration, VoLTE to VoLTE calls, and Interworking with the PSTN/3G and. Log analysis is emphasized where logs are available. Other topics are explored using detailed message flow diagrams.
Network Functions Virtualization (NFV) deployments are getting started while Software-Defined Networking (SDN) is a relatively new concept within the telco industry. NFV proposes to leverage standard IT virtualization technology to consolidate network equipment types onto industry-standard high-volume servers, switches, and storage. SDN proposes to take the traditional implementation of the networking and disassemble it. Orchestration is a collection of solutions to automate the deployment and management of VNFs and network services.
This course defines a practical approach to LTE RAN capacity planning, using field data to assess the capacity demand on the LTE RAN, identify potential capacity bottlenecks, and determine optimal capacity solutions.
The connected devices around us generate volumes of data on our environment, habits, and needs. Machine Learning, the next frontier in connected life, uses artificial intelligence to learn from those massive datasets via predicting modeling analytics. Join this 90-minute session to learn the foundations of machine learning, the opportunities for new services, and the network demands expected to create a responsive, more personalized connected life.
More connected devices results in increased opportunities for would-be hackers to identity and exploit network vulnerabilities. Join this 90-minute session to examine the different components that make up an IoT solution, some common threat vectors, and how to secure them.
Smart, connected devices of all types fundamentally vary in their performance demands and network requirements. Join this 90-minute session on the Internet of Things, and how technologies like SDN and 5G will create an environment to launch IoT at scale.