Imagine being able to download every HD video on Netflix in just one second… Now, with Japan, we can say yes. Japan’s National Institute of Information and Communications Technology (NICT) achieved a world-record internet data transmission speed of 1.02 petabits per second (Pbps) in a lab setting. What Actually Happened Achieved using a newly developed standard 19-core optical fibre, […]
The upcoming Android 16 release introduces a critical new security feature: Network Notification Warnings This enhancement is designed to alert users in real time when their mobile devices are exposed to unsafe network behaviours such as: A mobile network requests the device’s identifiers (IMSI, IMEI). A network attempting to force the device onto an unencrypted […]
Vulnerability Details: CVE-2024-53026. It is a vulnerability affecting O2 UK’s VoLTE/IMS service, disclosed in mid-May 2025. Rated Low, with a CVSS v3 score of 3.5. It has a limited impact on confidentiality and no effect on integrity or availability. What Happened? When one user places an IMS call, the network improperly exposes a “Cellular‑Network‑Info” SIP header. This […]
Network Slicing is essentially the ability to divide your network into individual use cases, each tailored to provide specialised services. Traditionally, in 4G, the APN (Access Point Name) was probably the earliest form of network slicing in a mobile network, allowing operators to divide their networks according to service requirements. Accurate 5G network slicing, as […]
For the introduction of 5G, 3GPP has specified five possible configurations, or ‘options’, for connecting to an EPC or a new 5G core network (six if the current 4G system is included). The features that distinguish each Option are: Use of Dual Connectivity; Radio Access Technology acting as master node Core Network used. The Options […]
Synchronization in 5G ensures precise timing and coordination across the network, enabling key technologies like TDD, beamforming, and ultra-low latency. 5G TDD networks utilise the same frequency for both uplink (UL) and downlink (DL), with time slots separating them. If base stations are out of sync, UL/DL transmissions collide, resulting in interference and dropped connections. […]
The 5G Non-Terrestrial Network (NTN) integrates satellite and airborne platforms with terrestrial 5G networks to provide ubiquitous coverage. The Next-Generation Radio Access Network (NG-RAN) architecture in 5G NTN can be designed to be transparent (i.e., with minimal on-board processing) to reduce payload complexity while ensuring seamless interoperability with terrestrial 5G systems. A transparent NTN payload acts as […]
Interworking security between 5G and EPC involves managing security contexts during mobility between the two systems. This ensures that the UE can maintain secure connections regardless of the access technology used. The UE can operate in Single or Dual Registration mode, maintaining separate security contexts for each system. During mobility from EPS to […]
As of April 2025, the global landscape of Voice over LTE (VoLTE) roaming agreements has expanded significantly, reflecting the industry’s shift towards all-IP voice services and decommissioning legacy 2G/3G networks. Global VoLTE Roaming Agreements According to the GSMA, over 900 VoLTE roaming agreements have been established worldwide. These agreements involve more than 250 mobile network operators across approximately […]
The blackout, which began around midday, disrupted essential infrastructure, including mobile networks, internet services, and emergency communication systems. In both Spain and Portugal, users experienced difficulties with voice calls, and data services were only partially functional. This disruption affected not just everyday communication but also critical services like hashtag emergency calls and public safety communications. In […]
I wrote an article before about ” What is GT (Global Title)? Why Do We Need It?” What is Global Title Leasing? GT leasing is the practice of a mobile operator entering into a commercial arrangement to allow another operator to use one or more of its GTS. Lessees obtain access to the global SS7 […]
