The 5G Non-Terrestrial Network (NTN) integrates satellite and airborne platforms with terrestrial 5G networks to provide ubiquitous coverage. The Next-Generation Radio Access Network (NG-RAN) architecture in 5G NTN can be designed to […]
Interworking security between 5G and EPC involves managing security contexts during mobility between the two systems. This ensures that the UE can maintain secure connections regardless of the access […]
As of April 2025, the global landscape of Voice over LTE (VoLTE) roaming agreements has expanded significantly, reflecting the industry’s shift towards all-IP voice services and decommissioning legacy 2G/3G networks. […]
The blackout, which began around midday, disrupted essential infrastructure, including mobile networks, internet services, and emergency communication systems. In both Spain and Portugal, users experienced difficulties with voice calls, and […]
I wrote an article before about ” What is GT (Global Title)? Why Do We Need It?” What is Global Title Leasing? GT leasing is the practice of a mobile […]
Last weekend, by coincidence, I found a fraud story related to the Telecom domain called “Spoofing CLI” or “Calling Line Identification (CLI) spoofing.” which is a technique used in mobile […]
The SS7 network was once considered an environment that controls users’ access to network-based content and services, allowing licensed mobile operators to access customer data. However, many unlicensed entities currently […]
Many types of firewalls are often categorized by system protection, form factor, network placement, and data filtering method. Regarding 5G, Firewalls protect different network layers — especially in the Service-Based […]
Sunsetting 2G and 3G networks is not an easy step for mobile network operators (MNOs) due to several technical, financial, and social factors. The decision isn’t just about technology—it’s about […]
? The SS7 network was once considered an environment that controls users’ access to network-based content and services, allowing licensed mobile operators to access customer data. However, many unlicensed entities […]
?Previous generations relied on the SS7 and Diameter protocols. The 5G network core is built on well-known Internet protocols such as HTTP and TLS. ? Security threats associated with 3G […]
