6G Role in Solving 5G Multiple Architecture Issue
June 11, 2025

For the introduction of 5G, 3GPP has specified five possible configurations, or ‘options’, for connecting to an EPC or a new 5G core network (six if the current 4G system […]

Why Synchronization is Critical in 5G Networks
June 4, 2025

Synchronization in 5G ensures precise timing and coordination across the network, enabling key technologies like TDD, beamforming, and ultra-low latency. 5G TDD networks utilise the same frequency for both uplink […]

Transparent 5G NTN NG-RAN Architecture
May 27, 2025

The 5G Non-Terrestrial Network (NTN) integrates satellite and airborne platforms with terrestrial 5G networks to provide ubiquitous coverage. The Next-Generation Radio Access Network (NG-RAN) architecture in 5G NTN can be designed to […]

Interworking Security Between 5G and EPC
May 4, 2025

Interworking security between 5G and EPC involves managing security contexts during mobility between the two systems. ​ This ensures that the UE can maintain secure connections regardless of the access […]

VoLTE Roaming Global Coverage (2025)
May 3, 2025

As of April 2025, the global landscape of Voice over LTE (VoLTE) roaming agreements has expanded significantly, reflecting the industry’s shift towards all-IP voice services and decommissioning legacy 2G/3G networks. […]

Widespread Power Outage hits Spain and Portugal
April 28, 2025

The blackout, which began around midday, disrupted essential infrastructure, including mobile networks, internet services, and emergency communication systems. In both Spain and Portugal, users experienced difficulties with voice calls, and […]

Global Title Lease is BANNED in UK
April 26, 2025

I wrote an article before about ” What is GT (Global Title)? Why Do We Need It?” What is Global Title Leasing?  GT leasing is the practice of a mobile […]

What is Calling Line Identification (CLI) Spoofing?
April 25, 2025

Last weekend, by coincidence, I found a fraud story related to the Telecom domain called “Spoofing CLI” or “Calling Line Identification (CLI) spoofing.” which is a technique used in mobile […]

Common SS7 Attacks through Data Leakage
April 19, 2025

The SS7 network was once considered an environment that controls users’ access to network-based content and services, allowing licensed mobile operators to access customer data. However, many unlicensed entities currently […]

The Importance of Firewall in 5G Network
April 12, 2025

Many types of firewalls are often categorized by system protection, form factor, network placement, and data filtering method. Regarding 5G, Firewalls protect different network layers — especially in the Service-Based […]

2G and 3G Sunset is Not An Easy step for MNO
April 5, 2025

Sunsetting 2G and 3G networks is not an easy step for mobile network operators (MNOs) due to several technical, financial, and social factors. The decision isn’t just about technology—it’s about […]