Speaking Engagements & Private Workshops - Get Dean Bubley to present or chair your event

Need an experienced, provocative & influential telecoms keynote speaker, moderator/chair or workshop facilitator?
To see recent presentations, and discuss Dean Bubley's appearance at a specific event, click here

Showing posts with label WiFi. Show all posts
Showing posts with label WiFi. Show all posts

Saturday, October 07, 2023

Train connectivity - is passenger Wi-Fi too linked to rail portals' needs?

This post originally appeared on Oct 5 on my LinkedIn feed, which is now my main platform for both short posts and longer-form articles. It can be found here, along with the comment stream. Please follow / connect to me on LinkedIn, to receive regular updates (about 1-3 / week)

It's always interesting to attend non-telecom industry events. Too often, we breathe our own smoke. Visiting another sector's conferences gives better perspective. Often, networks are less important than we imagine for "verticals".

Yesterday I chaired the Connectivity stream of the World Passenger Festival conference in Vienna, an event primarily for the rail industry, plus other forms of transport mobility. The speakers in my breakout covered Wi-Fi access onboard trains and at stations, plus how to manage video traffic. 5G was covered for on-train network backhaul, neutral-host provision and possible use-cases like AR-enabled tourism & urban mobility V2X safety for buses and bikes.

The rest of the conference and show floor was about passenger experiences more generally. Ticketing, sleeper trains, coordination with other types of transport, train-based tourism and so on. Plenty of talk about apps and "transformation" more broadly, but the network wasn't a priority.

There was also a rather muddled main-stage keynote on #5G by Accenture, with 2018-era references to millisecond latencies, network slicing and autonomous vehicles. It conflated normal MNO 5G with the long-promised critical-comms rail variant #FRMCS and bizarrely suggested they would coexist on converged, virtualised networks. A later chat on their booth with a more knowledgeable colleague gave a lot more clarity & agreement on the realities & drivers of operational connectivity for future rail - especially enabling ECTS (European Train Control System) for higher capacity on rail networks.

The rail industry is at the apex of a trend I discussed in a recent newsletter article and post - the need for customers to have reliable access to smartphone apps for ticketing, journey-planning, at-seat entertainment and catering etc. Travellers need to download passes, make payments and use QR codes.

This explains why so much of the on-train #WiFi strategy is linked to apps and portals, and much less to general wireless infrastructure, whether MNO or dedicated trackside/FRMCS.

Some rail Wi-Fi teams view cellular as a cost (for backhaul) or a rival that stops passengers seeing the portal and info/monetisation offers, when they directly access the Internet from phones. They filter or cache video use to reduce cost and congestion. One even tries to dissuade passengers from using cellular, to save 4G/5G network capacity for the train!

In my view, there is both too much "joined-up" thinking and too little. It's either 5G maximalism ("we don't need Wi-Fi on trains") or it directly links connectivity to the rail operator's own priorities, rather than passengers' real Internet access needs and expectations.

What is needed is integration in the right places and layers. Shared trackside masts and fibre, plus hybrid connectivity to trains from public 5G, trackside dedicated networks (including #private5G) and satellite, delivering good, neutral, fast on-train Wi-Fi AND cellular for passengers.

 



Friday, October 06, 2023

Indoor wireless & the need for unlicensed 6GHz

This post originally appeared on October 2 on my LinkedIn newsletter, which is now my main platform for both short posts and longer-form articles. It can be found here, along with the comment stream. Please subscribe / connect to me on LinkedIn, to receive regular updates (about 1-3 / week)

 

Note: This article has been commissioned by the Dynamic Spectrum Alliance, based on my existing well-known analysis and positions, which I have been discussing for many years both publicly and privately. I believe that in-building wireless - irrespective of technology - receives far too little attention from policymakers and regulators. 6GHz should be indoor-primary spectrum.


Abstract & summary: The vast bulk of wireless data traffic today is for indoor applications. In future, in-building wireless will become even more important. It is ideally-suited to 6GHz spectrum, made available on an unlicensed basis. A licensed model for 5G mobile in 6GHz would be unable to deliver coverage consistently for more than a small number of sites.

Indoor wireless is already critical & often overlooked

Industry estimates suggest that 60-80% of cellular data is delivered to indoor users, predominantly on smartphones. Additional statistics shows that smartphones also typically consume another 2-5x the cellular data volume on Wi-Fi, almost all of which is indoors or in vehicles. In other words, 90%+ of total smartphone data is consumed inside buildings.

In addition, residential fixed broadband traffic volumes are roughly 10-20x that of mobile broadband, with final delivery mostly over Wi-Fi, often to non-smartphone devices such as smart TVs, laptops, game consoles and voice assistants.

Outside the consumer market, a great deal of non-residential wireless connectivity is also indoors – healthcare, education, manufacturing, conventions, hospitality and office environments are all increasingly dependent on wireless, especially with the rise of industrial automation systems, IoT, robots, connected cameras and displays. These map to the rise in cloud- and video-based business processes.

Most wireless uses & devices are indoor-centric

This does not imply that outdoor wireless use is either trivial or unimportant. Most obviously, everyone uses their phones for calling, messaging, mapping and various transport and other apps while on-the-move. Vehicle connectivity is becoming essential, as well as wireless use for safety, utilities and smart-city infrastructure. Some sectors such as agriculture, logistics and construction are predominantly outdoor-oriented, albeit often at specific locations and sites.

But to a rough approximation, if 80%+ of wireless use is indoors, then 80%+ of economic and social benefit of wireless will accrue indoors as well. This applies irrespective of the technology involved – Wi-Fi, 4G/5G cellular, or even Bluetooth.

Future growth of indoor wireless

The demands for indoor connectivity are likely to grow in both scale and scope in coming years. There will be huge demand for high-throughput, low-latency access for both consumer and enterprise use-cases.

  • Gigabit broadband, especially delivered with fibre, is becoming the default for both residential and business premises. In the medium term, we can expect 10Gig services to become more common as well. In many cases, the bottleneck is now inside the building, and local wireless systems need to keep pace with the access network.
  • There is a growing array of demanding devices and applications connected inside homes and enterprises premises. 4K and 8K screens, automation systems, healthcare products, AR/VR systems, cameras for security and industrial purposes, robots and much more.
  • Wireless devices will increasingly be located in any room or space inside a building, including bedrooms, garages, basements, meeting rooms, factory-floors and hospital operating theatres.
  • The density of devices per-building or per-room will increase exponentially. While some will be low-traffic products such as sensors, ever more appliances and systems will feature screens, cameras and cloud/AI capabilities demanding greater network performance.
  • There will be growing emphasis on the efficiency of networks, in terms of both energy and spectrum usage. “Blasting through walls” with wireless signals will be viewed negatively on both counts.

Yet only some policymakers and regulators have explicit focus on indoor wireless in their broadband and spectrum policies. There has been some positive movement recently, with regulators in markets such as the UK, Germany, Canada and Saudi  Arabia addressing the requirements. But it is now time for all governments and regulators to specifically address indoor wireless needs – and acknowledge the need for more spectrum, especially if they eventually want to achieve “gigabit to each room” as a policy goal.

Wi-Fi can satisfy indoor requirements, but needs 6GHz

Almost all indoor devices discussed here have Wi-Fi capabilities. A subset have 5G cellular radios as well. Very few are 5G-only. This situation is unlikely to change much, especially with a 5-10 year view.

Yet Wi-Fi faces a significant limit to its performance, if it just has access to traditional 2.4GHz and 5GHz bands. Not only are these limited in frequency range, but they also have a wide variety of legacy devices, using multiple technologies, that must coexist with any new systems.

While mesh systems have helped extend the reach to all rooms in a home, and Wi-Fi 6 brings new techniques to improve performance and device density in consumer and enterprise settings, much more will be required in future.

Now, Wi-Fi 6E and 7 generations are able to use the 6GHz band. This adds up to 1.2GHz of extra spectrum, with almost no sources of interference indoors, and almost no risk of indoor use creating extra interference to incumbent outdoor users, especially at lower power levels.

6GHz Wi-Fi would be able to address all the future requirements discussed in the previous section, as well as reducing system latency, improving indoor mobility and providing greater guarantees of QoS / reliability.

6GHz 5G is unsuitable for indoor use, and of limited use outdoors

By contrast, 6GHz is a poor fit for indoor 5G. Most buildings will be unable to use outdoor-to-indoor propagation reliably, given huge propagation challenges through walls. This would be hugely wasteful of both energy and spectrum resource anyway. This situation will worsen in future as well, with greater use of insulated construction materials and glass.

That leaves dedicated indoor systems such as small cells or distributed antenna or radio systems. Current DAS systems cannot support 6GHz radios – most struggle even with 3.5GHz. It may be possible to upgrade some of the more advanced systems with new radio heads, but few building owners would be willing to pay, and almost no MNOs would. In any case, only a fraction of buildings have indoor cellular systems, especially beyond the top tier of shopping malls, airports and other large venues.

The industry lacks the human and financial resources to implement new 6GHz-capble indoor systems in more than a tiny proportion of the millions of buildings worldwide, especially residential homes and small businesses.

Enabling public 5G services to work reliably indoors with 6GHz is therefore a decade-long project, at least. It would likely be the mid-2030s before 5G (or 6G) devices could routinely use 6GHz inside buildings. Lobbyist estimations of the notional GDP uplift from IMT use of the band ignore both the timing and the practical challenges for indoor applications. A very heavy discount % should be applied to any such calculations, even if the baseline assumptions are seen as credible.

Private 5G systems in factories or warehouses could theoretically use 6GHz licensed cellular, but most developed countries now have alternative bands being made available on a localised basis, such as CBRS, 3.8-4.2GHz or 4.9GHz. Many countries also have (unused) mmWave options for indoor private 5G networks. In theory, 5G systems could also use an unlicensed 6GHz band for private networks, although previous unlicensed 4G variants in 5GHz never gained much market traction.

It is worth noting that there are also very few obvious use-cases for outdoor, exclusive-licensed 6GHz for 5G either, beyond a generic increment in capacity, which could also be provided by network densification or other alternative bands. Most markets still have significant headroom in midband 3-5GHz spectrum for 5G, especially if small cells are deployed. The most-dense environments in urban areas could also exploit the large amount of mmWave spectrum made available for cellular use, typically in the 24-28GHz range, which is already in some handsets and is still mostly unused.

Conclusions

Regulators and policymakers need to specifically analyse the use and supply/demand for indoor wireless, and consider the best spectrum and technology options for such applications and devices. Analysis will show that in-building wireless accounts for the vast bulk of economic and social benefits from connectivity.

This is best delivered by using Wi-Fi, which is already supported by almost all relevant device types. With the addition of 6GHz, it can address the future expected growth delivered by FTTX broadband, as well as video, cloud and AR/VR applications.

The ultra-demanding uses that specifically require cellular indoors can use existing bands with enhanced small cells and distributed radios, neutral-host networks, or private 5G networks in the 3-5GHz range. There is also the ample mmWave allocations for 5G.

A final fundamental element here is timing. 6 GHz Wi-Fi chipsets and user devices are already shipping in their 100s of millions. Access points are widely available today and becoming more sophisticated with Wi-Fi 7 and future 8+ versions. By contrast, 5G/6G use of the band for indoor use is unlikely until well into the next decade, if at all.

Indoor wireless is critically important, growing, and needs Wi-Fi.

And Wi-Fi needs 6GHz.

 

Friday, June 23, 2023

Connectivity on trains is hard - but both Wi-Fi and cellular need to be provided for passengers

This post originally appeared on May 24 on my LinkedIn feed, which is now my main platform for both short posts and longer-form articles. It can be found here, along with the comment stream. Please follow / connect to me on LinkedIn, to receive regular updates (about 1-3 / week)

 There have been recent headlines about the possible ending of on-train passenger #WiFi services in the UK. It is deeply controversial.

Apparently the Department for Transport (DfT), United Kingdom has insisted rail WiFi must be "justified financially". It's unclear if that means by extra ticket sales, higher customer satisfaction, or the use of WiFi for #train operational functions like cameras and wireless payment terminals.

I hope it's not referring to so-called "monetisation" by customers paying for WiFi, or being served adverts. On trains, WiFi is a basic amenity, like toilets or power sockets.

That said, train WiFi in the UK is often problematic. It uses clunky captive portals, and often old access points & slow/patchy 4G backhaul. It often fails to work well, or at all. It sometimes blocks video or VPNs. By contrast, in-station WiFi is run separately - and often much better.

Public cellular coverage on the rail network is also poor. Many rail lines run through cuttings and tunnels with limited room for trackside infrastructure & poor lines-of-sight to cell towers. The recent Department for Science, Innovation and Technology Wireless Infrastructure Strategy highlighted poor #railway #wireless coverage & pushed for regular monitoring and access to trackside fibre.
 
What should DfT, DSIT, Network Rail, Train Operating Companies and the future restructured Great British Railways Transition Team (GBRTT) do?
 
- Recognise both cellular & WiFi are essential for passengers, especially on long-distance trains where laptops are common
- Understand that cellular - especially #5G - has problems with signals reaching inside train carriages
- Don't underestimate forecasts for future data use. Add in uplink as well as downlink, and think about latency. Trains may need 1-5 Gbps in the medium term, via a mix of cellular & WiFi.
- Ensure on-train WiFi is easy to use & easily-upgraded. No captive portals, no “monetisation” with ads/data capture & a clear roadmap for regular upgrades. No blocking of any apps, especially VPNs and video. Apply Net Neutrality rules.
- Federation or roaming between on-train & station WiFi systems, extending to smart cities & metro bus/train/tram WiFi over time
- Easier access for MNOs / #neutralhosts to build trackside or near-track infrastructure & use gantries & fibre assets
- Decouple passenger connectivity needs from future critical #FRMCS deployment. They have different timing/cadence & investment cases
- Look at trackside 5G neutral host networks delivered with “excess” spectrum from any future 4-3 merger of MNOs
- Insist on-train gateways are modular & can use a dynamic mix of public 5G, trackside wireless & eventually satellite in remote areas. Ensure they are easily upgradeable without trains being taken out of service
- Upgrade on-train signal repeaters & look at window-etching for better outdoor-to-indoor performance

Note: I wrote this on WiFi on a train back to London from this week’s Wi-Fi NOW conference.


 

Saturday, April 29, 2023

6G convergence or "network of networks" must be bi-directional, not assume a 3GPP umbrella

This post originally appeared on my LinkedIn feed, which is now my main platform for both short posts and longer-form articles. It can be found here, along with the comment stream. Please follow / subscribe to receive regular updates (about 1-3 / week)

 Following on from my (rather controversial) post the other day about #6G and #IMT2030 needing to be indoor-primary and also have an IEEE / #WiFi candidate, I'm now going to *further* annoy various people.

There's a lot of talk about 6G being a "network of networks". This follows on from previous similar themes about #convergence and #HetNets. At one level I agree, but I think there needs to be a perspective shift.

There has been a long string of attempts to blend Wi-Fi and cellular, going all the way back to UMA in the 2G/3G era around 2005. (I was a vociferous critic).

There's been a alphabet-zoo of acronyms covering 3GPP gateway functions or selection/offload approaches - GAN, ANDSF, TWAG, N3IWF, ATSSS - and probably others I've forgotten. From the Wi-Fi side there's been Hotspot 2.0 and others. More recently we've seen an attempt to bridge fixed and mobile networks, even going as far as pitching 3GPP-type cores for fixed ISPs.

Pretty much all of these have failed to gain traction. They've had limited deployments and successes here and there, but nobody can claim that true "converged wireless" is ubiquitous or even common. 99% of WiFi has no connection to cellular. Genuine "offload" is tiny.

But despite this, the 6G R&D and vision seems to be looking to do it all over again. This phrase "network of networks" cropped up regularly at the 6GWorld #6Gsymposium events I attended this week. It now usually includes integrating #satellite or non-terrestrial (NTN) capabilities as much as Wi-Fi.

But there's a bit of an unstated assumption I think needs to be challenged. There seems to be unquestioned acceptance that the convergence layer - or perhaps "umbrella" sheltering all the various technologies is necessarily the 3GPP core network.

I think this is a problem. Many of the new and emerging 6G stakeholders (for instance enterprises, satellite operators, or fixed providers) do not understand 3GPP cores, nor have the almost religious devotion to that model common in the legacy cellular sector.

So I think any "convergence" in IMT2030 must be defined as bi-directional. Yes, Wi-Fi and satellite can slot into a 3GPP umbrella. But satellite operators need to be able to add terrestrial 6G as an add-on to their systems, while Wi-Fi controllers (on-prem or cloud based) should be able to look after "naked" (core-free) 3GPP radios where appropriate.

This would also flow through to authentication methods, spectrum coordination and so on. Also it should get reflected in government policy & regulation.

My view is that 3GPP-led convergence has largely failed. Maybe it gets fixed in 5G/6G eras, but maybe it won't. We need #5G and 6G systems to have both northbound and southbound integration options.

I also think we need to recognise that "convergence" is itself only one example of "combination" of networks. There are numerous other models, such as bonding or hybrids that connect 2+ separate networks in software or hardware.

 

Friday, April 28, 2023

6G must be indoor-primary and have a Wi-Fi candidate technology

This post originally appeared on my LinkedIn feed, which is now my main platform for both short posts and longer-form articles. It can be found here, along with the comment stream. Please follow / subscribe to receive regular updates (about 1-3 / week)

I'm giving a lot of thought to #6G design goals, priorities & technology / policy choices. Important decisions are coming up. I'll be exploring them in coming weeks and months. Two important ones I see:

- 6G / #IMT2030 must be "indoor-primary"
- There must be a IEEE / Wi-Fi Alliance candidate tech for 6G

The first one is self-evident. The vast bulk of mobile use - and an even-larger % of total wireless use - is indoors. It's inside homes, offices schools, factories, warehouses, public spaces like malls and stadia - as well as inside vehicles like trains. Even outdoors, a large % of usage is on private sites like industrial complexes or hospital campuses.

Roughly 80% of mobile use is indoors - more if you include wireless streaming to smart TVs and laptops/tablets. By the 2030s 6G era, there will be more indoor wireless use for #industrialautomation, #gaming, education, healthcare, #robotics and #AR / #VR / #metaverse and so on.

This implies that economic, social, welfare and cultural upsides will be indoor-primary. 80%+ of any GDP uplift will be indoor-generated. This suggests 6G tech design & standards - and associated business models and regulation - should be indoor-oriented too.

The IEEE / #WiFi idea follows on from this. The default indoor wireless tech today is Wi-Fi. There is a lot of indoor cellular use, but currently 5G is supported poorly - and certainly not everywhere.

While 5G and future 6G indoor #smallcells, #neutralhost and repeaters / DAS are evolving fast, *nobody* expects true ubiquity. Indoor cellular will remain patchy, especially multi-operator. And many devices (eg TVs) don't have cellular radios anyway.

This means that WiFi - likely future #WiFi8 and #WiFi9 - will remain central to in-building connectivity in the 6G era, no matter how good the tech for reconfigurable surfaces or other cellular innovations become.

IEEE decided not to pitch WiFi6 formally for 5G / IMT2020, but instead just show it surpassed all the metrics. But "we could have done it if we wanted" isn't good enough. There are no government-funded "WiFi Testbed Programs" or "WiFi Innovation Centres of Excellence" because of this lower visibility.

Governments are ITU members and listen to it. If policymakers want the benefits of full connectivity, they need to support it with spectrum, targets and funding, across *all* indoor options.

And if the WiFi industry wants full / easy access to new resources, it needs to be an official 6G / IMT2030 technology. It needs access to IMT licensed spectrum, especially for local licenses with AFC.

This idea will be very unpopular among both cellular industry (3GPP pretends it is the "keeper of the G's") and the WiFi sector, which sees it as a lot of extra work & politics.

But I think it's essential for IMT2030 to embrace network diversity, plus ownership- & business-model diversity as central elements of 6G.

 

Thursday, February 23, 2023

Local networks: when telecoms becomes "pericoms"​

Published via my LinkedIn Newsletter - see here to subscribe / see comment thread

"Telecoms" or "telecommunications" is based on the Greek prefix "tele-".

It means "at a distance, or far-off". It is familiar from its use in other terms such as telegraph, television or teleport. And for telecoms, that makes sense - we generally make phone calls to people across medium or long distances, or send then messages. Even our broadband connections generally tend to link to distant datacentres. The WWW is, by definition, worldwide.

The word "communications" actually comes from a Latin root, meaning to impart or share. Which at the time, would obviously have been done mostly through talking to other people directly, but could also have involved writing or other distance-independent methods.

This means that distant #communications, #telecoms, has some interesting properties:

  • The 2+ distant ends are often (but not always) on different #networks. Interconnection is therefore often essential.
  • Connecting distant points tends to mean there's a good chunk of infrastructure in between them, owned by someone other than the users. They have to pay for it, somehow.
  • Because the communications path is distant, it usually makes sense for the control points (switches and so on) to be distant as well. And because there's typically payment involved, the billing and other business functions also need to be sited "somewhere", probably in a #datacentre, which is also distant.
  • There are a whole host of opportunities and risks with distant communications, that mean that governments take a keen interest. There are often licenses, regulations and internal public-sector uses - notably emergency services.
  • The infrastructure usually crosses the "public domain" - streets, airwaves, rooftops, dedicated tower sites and so on. That brings additional stakeholders and rule-makers into the system.
  • Involving third parties tends to suggest some sort of "service" model of delivery, or perhaps government subsidy / provision.
  • Competition authorities need to take into account huge investments and limited capacity/scope for multiple networks. That also tends to reduce the number of suppliers to the market.

That is telecommunications - distant communications.

But now consider the opposite - nearby communications.

Examples could include a private 5G network in a factory, a LAN in an office, a WiFi connection in the home, a USB cable, or a Bluetooth headset with a phone. There are plenty of other examples, especially for IoT.

These nearby examples have very different characteristics to telecoms:

  • Endpoints are likely to be on the same network, without interconnection
  • There's usually nobody else's infrastructure involved, except perhaps a building owner's ducts and cabinets.
  • Any control points will generally be close - or perhaps not needed at all, as the devices work peer-to-peer.
  • There's relatively little involvement of the "public domain", unless there are risks like radio interference beyond the network boundaries.
  • It's not practical for governments to intervene too much in local communications - especially when it occurs on private property, or inside a building or machine.
  • There might be a service provider, but equally the whole system could be owned outright by the user, or embedded into another larger system like a robot or vehicle.
  • Competition is less of an issue, as is supplier diversity. You can buy 10 USB cables from different suppliers if you want.
  • Low-power, shared or unlicensed spectrum is typical for local #wireless networks.

I've been trying to work out a good word for this. Although "#telecommunications" is itself an awkward Greek / Latin hybrid I think the best prefix might be Greek again - "peri" which means "around", "close" or "surrounding" - think of perimeter, peripheral, or the perigee of an orbit.

So I'm coining the term pericommunications, to mean nearby or local connectivity. (If you want to stick to all-Latin, then proxicommunications would work quite well too).

Just because a company is involved in telecoms does not mean it necessarily can expect a role in pericoms as well. (Or indeed, vice versa). It certainly can participate in that market, but there may be fewer synergies than you might imagine.

Some telcos are also established and successful pericos as well. Many home broadband providers have done an excellent job with providing whole-home #WiFi systems with mesh technology, for example. In-building mobile coverage systems in large venues are often led by one telco, with others onboarding as secondary operators.

But other nearby domains are trickier for telcos to address. You don't expect to get your earbuds as an accessory from your mobile operator - or indeed, pay extra for them. Attempts to add-on wearables as an extra SIM on a smartphone account have had limited success.

And the idea of running on-premise enterprise private networks as a "slice" of the main 4G/5G macro RAN has clearly failed to gain traction, for a variety of reasons. The more successful operators are addressing private wireless in much the same way as other integrators and specialist SPs, although they can lean on their internal spectrum team, test engineers and other groups to help.

Some are now "going the extra mile" (sorry for the pun) for pericoms. Vodafone has just announced its prototype 5G mini base-station, the size of a Wi-Fi access point based on a Raspberry Pi and a Lime Microsystems radio chip. It can support a small #5G standalone core and is even #OpenRAN compliant. Other operators have selected new vendors or partners for campus 4G/5G deployments. The 4 UK MNOs have defined a set of shared in-building design guidelines for neutral-host networks.

It can be hard for regulators and policymakers to grasp the differences, however. The same is true for consultants and lobbyists. An awful lot of the suggested upsides of 5G (or other forms of connectivity) have been driven by a tele-mindset rather than a peri-view.

I could make a very strong argument that countries should really have a separate pericoms regulator, or a dedicated unit within the telecoms regulator and ministry. The stakeholders, national interests and economics are completely different.

A similar set of differences can be seen in #edgecomputing: regional datacentres and telco MEC are still "tele". On-premise servers or on-device CPUs and GPUs are peri-computing, with very different requirements and economics. Trying to blur the boundary doesn't work well at present - most people don't even recognise it exists.

Overall, we need to stop assuming that #pericoms is merely a subset of #telecoms. It isn't - it's almost completely different, even if it uses some of the same underlying components and protocols.

(If this viewpoint is novel or interesting and you would like to explore it further and understand what it means for your organisation - or get a presentation or keynote about it at an event - please get in touch with me)

Sunday, July 24, 2022

New Report on Enterprise Wi-Fi: No, 5G is not enough

(Initially posted on LinkedIn, here. Probably best to use LI for comments & discussion)

Published this week: my full STL Partners report on Enterprise Wi-Fi. Click here to get the full summary & extract.

Key takeout: Telcos, MNOs & other service providers need to take Wi-Fi6 , 6E & (soon) 7 much more seriously. So do policymakers.

5G is not enough for solving enterprises' connectivity problems on its own. It has important roles, especially in Private 5G guise, but cannot replace Wi-Fi in the majority of situations. They will coexist.

Wi-Fi will remain central to most businesses' on-site connectivity needs, especially indoors, for employees, guests and IoT systems.

Telcos should support Wi-Fi more fully. They need a full toolkit to drive relevance in enterprise, not just a 5G hammer & pretend everything is a nail. CIOs and network purchasers know what they want - and it's not 5G hype or slice-wash.

Newer versions of Wi-Fi solve many of the oft-cited challenges of legacy systems, and are often a better fit with existing IT and networks (and staff skills) than 5G, whether private or public. 




Deterministic latency, greater reliability and higher density of devices make 6/6E/7 more suitable for many demanding industrial and cloud-centric applications, especially in countries where 6GHz spectrum is available. Like 5G it's not a universal solution, but has far greater potential than some mobile industry zealots seem to think.

Some recommendations:

- Study the roadmaps for Wi-Fi versions & enhancements carefully. There's a lot going on over the next couple of years.
- CSP executives should ensure that 5G "purists" do not control efforts on technology strategy, regulatory engagement, standards or marketing.
- Instead, push a vision of "network diversity", not an unrealistic monoculture. (Read my recent skeptical post on slicing, too)
- Don't compare old versions of Wi-Fi with future versions of 5G. It is more reasonable to compare Wi-Fi 6 performance with 5G Release 15, or future Wi-Fi 7 with Rel17 (and note: it will arrive much earlier)
- 5G & Wi-Fi will sometimes be converged... and sometimes kept separate (diverged). Depends on the context, applications & multiple other factors. Don't overemphasise convergence anchored in 3GPP cores.
- Consider new service opportunities from OpenRoaming, motion-sensing and mesh enhancements.
- The Wi-Fi industry itself is getting better at addressing specific vertical sectors, but still needs more focus and communication on individual industries
- There should be far more "Wi-Fi for Vertical X, Y, Z" associations, events and articles.
- Downplay clunky & privacy-invasive Wi-Fi "monetisation" platforms for venues and transport networks.
- Policymakers & regulators should look at "Advanced Connectivity" as a whole, not focus solely on 5G. Issue 6GHz spectrum for unlicenced use, ideally the whole band
- Support Wi-Fi for local licensed spectrum bands (maybe WiFi8). Look at 60GHz opportunities.
- Insist Wi-Fi included as an IMT2030 / 6G candidate.

See link for report extract & Exec Summary


Thursday, April 07, 2022

Geopolitics, war & network diversity

This post was originally published on my LinkedIn Newsletter (here). Please sign up, and join the discussion thread there.

Background

I'm increasingly finding myself drawn into discussions of #geopolitics and how it relates to #telecoms. This goes well beyond normal regulatory and policymaking involvement, as it means that rules - and opportunities and risks - are driven by much larger "big picture" strategic global trends, including the war in Ukraine.

As well as predicting strategic shifts, there are also lessons to be learned from events at a local, tactical level which have wider ramifications. Often, there will be trade-offs against normal telecoms preoccupations with revenue growth, theoretical "efficiency" of spectrum or network use, standardisation, competition and consumer welfare.

This is the first of what will probably be a regular set of articles on this broader theme. Here, I'm focusing on the Ukraine war, in the context some of the other geopolitical factors that I think are important. I'm specifically thinking about what they may mean for the types of network technology that are used, deployed and developed in future. This has implications for #5G, #6G, #satellite networks, #WiFi, #FTTX and much more, including the cloud/edge domains that support much of it. 

 



Ukraine and other geopolitical issues

This article especially drills into how the conflict in Ukraine has manifested in terms of telecoms and connectivity, and attempts to extrapolate to some early recommendations for policymakers more broadly.

I'm acutely consicous of the ongoing devastation and hideous war crimes being perpetrated there - I hope this isn't too early to try to analyse the narrow field of networking dispassionately, while conflict still rages.

For context, as well as Ukraine, other geopolitical issues impacting telecoms include:

  • US / West vs. China tensions, from trade wars to broader restrictions on the use of Huawei and other vendors' equipment, as well as sanctions on the export of components.
  • Impact of the pandemic on supply chains, plus the greater strategic and political importance of resilient telecom networks and devices in the past two years.
  • The politics of post-pandemic recovery, industrial strategy and stimulus funds. Does this go to broadband deployment, themes such as Open RAN, national networks, smart cities/infrastructure, satellite networks... or somewhere else?
  • Tensions within the US, and between US and Europe over the role and dominance of "Big Tech". Personal data, monopoly behaviour, censorship or regional sovereignty etc. This mostly doesn't touch networks today, but maybe cloud-native will draw attention.
  • Semiconductor supply-chain challenges and the geopolitical fragility of Taiwan's chip-fabrication sector.
  • How telecoms (and cloud) fits within Net Zero strategies, either as a consumer of energy, or as an enabler of green solutions.
  • Cyber threats from nation-state actors, criminal cartels and terrorist-linked groups - especially aimed at critical infrastructure and health/government/finance systems.

In other words, there's a lot going on. It will impact 5G, 6G development, vendor landscapes, cloud - and also other areas such as spectrum policy and Internet governance.

Network diversity as a focus

I've written and spoken before about the importance of "network diversity" and the dangers of technology monocultures, including over-reliance on particular standards (eg 5G) or particular business models (eg national MNOs) as some sort of universal platform. It is now clear that it is more important than ever.

The analogy I made with agriculture, or ecological biodiversity, is proving to be robust.

(Previous work includes this article from 2020 about private enterprise networks, or my 2017 presentation keynote on future disruptions, at Ofcom's spectrum conference. (The blue/yellow image of wheat fields, repeated here in this post, was chosen long before it became so resonant as the Ukrainian flag). I've also covered the shift towards Open RAN and telecoms supplier diversification – including a long report I submitted to the UK Government's Diversification Task Force last year - see this post and download the report).

A key takeout from my Open RAN report was that demand diversity is as important as creating more supply choices in a given product domain. Having many classes of network operator and owner – for instance national MNOs, enterprise private 4G/5G, towercos, industrial MNOs and neutral hosts – tends to pull through multiple options for supply in terms of both vendor diversity and technology diversity. They have different requirements, different investment criteria and different operational models.

In Ukraine, the "demands" for connectivity are arising from an even more broad set of sources, including improvised communications for refugees, drones and military personnel.

The war in Ukraine & telecoms

There have been numerous articles published which highlight the surprising resilience and importance of Ukrainian telecoms during the war so far. Bringing together and synthesising multiple sources, this has highlighted a number of important issues around network connectivity:

  • The original “survivability” concept of IP networks seems to have been demonstrated convincingly. Whether used for ISPs’ Internet access, or internal backhaul and transport for public fixed and mobile networks, the ability for diverse and resilient routing paths seems to have mostly been successful.
  • Public national mobile networks - mostly 4G in Ukraine's case - have proven essential in many ways, whether that has been for reporting information about enemy combatants' locations and activities, obtaining advice from government authorities, or dealing with the evacuation as refugees. (I'm not sure if subway stations used as shelters have underground cellular coverage, or if there is WiFi). Authorities also seem to have had success in getting citizens to self-censor, to avoid disclosing sensitive details to their enemies.
  • Reportedly the Russian forces haven't generally targeted telecoms infrastructure on a widescale basis. This was partly because they have been using commerical mobile networks themselves. However, because roaming was disabled, Russian military use of their encrypted handsets and SIMs on public 3G/4G networks seems to have failed. Two articles here and here give good insight, and also suggests there may be network surveillance backdoors which Russia may have exploited. There have also been reports of stingrays ("fake" base stations used for interception of calls / identity) being deployed. It also appears that some towns and cities - notably the destroyed city of Mariupol - have been mostly knocked offline, partly because the electrical grid was attacked first.
  • Ukraine’s competitive telecoms market has probably helped its resilience. There is a highly fragmented fixed ISP landscape, with very inexpensive connections. There are over a dozen public peering-points across the country. There are three main MNOs, with many users having SIMs from 2+ operators. (This is a good overview article - https://ukraineworld.org/articles/ukraine-explained/key-facts-about-ukraines-telecom-industry). It seems they have enabled some form of national roaming to allow subscribers to attach to each others' networks.
  • WiFi hotspots (likely with mobile backhaul) have been used by NGOs evacuating refugees by buses.
  • Although it is still only being used at a small scale, the LEO satellite terminals from SpaceX’s StarLink seem to be an important contributor to connectivity – not least as a backup option. Realistically, satellite isn’t appropriate for millions of individual homes – and especially not personal vehicles and smartphones – but is an important part of the overall network-diversity landscape. Various commentators have suggested it is useful as a backup for critical infrastructure connectivity, as well as for mobile units such as special forces.
  • Another satellite broadband provider, Viasat, apparently suffered a cyberattack at the start of the war (link here), which knocked various modem users offline (or even "bricked" the devies), reportedly including Ukrainian government organisations. Investigations haven't officially named Russia, but a coincidence seems improbable. This attack also impacted users outside Ukraine.
  • Various peer-to-peer apps using Bluetooth or WiFi allow direct connections between phones, even if wide area connections are down (see link)
  • There have been some concerning reports about the impact of GPS jammers on the operation of cellular networks, which may use it as a source of “timing synchronisation” to operate properly, especially for TDD radio bands. While this has long been a risk for individual cell-sites from low-power transmitters, the use of deliberate electronic warfare tools could potentially point to broader vulnerabilities in future.
  • There has been wide use of commercial drones like the DJI Mavic-3 for surveillance (video and thermal imaging), or modified to deliver improvised weaponry. These use WiFi to connect to controllers on the ground, as well as a proprietary video transmission protocols (called O3+) which apparently has range of up to 15km using unlicensed spectrum. Some of the "Aerorozvidka" units reportedly then use StarLink terminals to connect back to command sites to coordinate artillery attacks (link).

In short, it seems that Ukraine has been well served by having lots of connectivity options - probably including some additional military systems that aren't widely discussed. It has benefited from multiple fixed, cellular and satellite networks, with potential for interconnect, plus inventive "quick fixes" after failures and collaboration between providers. It is exploiting licensed and unlicensed spectrum, with cellular, Wi-Fi and other technologies.

In other words, network diversity is working properly. There appears to be no single point of failure, despite deliberate attacks by invading forces and hackers. Connectivity is far from perfect, but it has held up remarkably well. Perhaps the full range of electronic warfare options hasn't been used - but given the geographical size of Ukraine and the inability of Russia forces to maintain supply-lines to distant units, that is also unsurprising.

Another set of issues that I haven't really examined are around connectivity within sanctions-hit Russia. Maybe it will have to develop more local network equipment manufacturers - if they can get the necessary silicon and other components. It probably will not wish to over-rely on Huawei & ZTE any more than some Western countries have been happy with Nokia and Ericsson as primary options. More problematic may be fixed-Internet routers, servers, WiFi APs and other Western-dominated products. I can't say I'm sympathetic, and I certainly don't want to offer suggestions. Let's see what happens.

Recommendations for policymakers, industry bodies and regulators

So what are the implications of all this? Hopefully, few other countries face a similar invasion by a large and hostile army. But preparedness is wise, especially for countries with unfriendly neighbours and territorial disputes. And even for everywhere else, the risks of cyberattacks, terrorism, natural disasters - or even just software bugs or human error - are still significant.

I should stress that I'm not a cybersecurity or critical infrastructure specialist. But I can read across from other trends I'm seeing in telecoms, and in particular I'm doing a lot of work on "path dependency" where small, innocent-seeming actions end up having long-term strategic impacts and can lock-in technology trajectories.

My initial set of considerations and recommendations:

  • As a general principle, divergence in technology should be considered at least as positively than convergence. It maintains optionality, fosters innovation and reduces single-point-of-failure risks.
  • National networks and telcos (fixed and mobile) are essential - but cannot do everything. They also need to cooperate during emergencies - a spirit of collaboration which seems to have worked well during the pandemic in many countries.
  • Normal ideas about cyber-resilience and security may not extend to the impact of full-scale military electronic warfare units, as well as more "typical" online hacking and malware attacks.
  • Having separate "air-gapped" networks available makes sense not just for critical communications (military, utilities etc) but for more general use. It isn't inefficient - it's insurance. There may be implications here for network-sharing in some instances.
  • Thought needs to be given to emergency fallbacks and improvised work-arounds, for instance in the event of mass power outages or sabotage. This is particularly important for software/cloud-based networks, which may be less "fixable" in the field. Can a 5G network be "bodged"? (that's "MacGyvred" to my US friends)? As a sidenote - how have electric vehicles fared in Ukraine?
  • Unlicensed spectrum and "permissionless communications" is hugely important during emergency situations. Yes, it doesn't have control or lawful intercept. But that's entirely acceptable in extreme circumstances.
  • Linkages between technologies, access networks and control/identity planes should generally be via gateways that can be closed, controlled or removed if necessary. If one is attacked, the rest should be firewalled off from it. For the same reason "seamless" should be a red-flag word for cross-tech / cross-network roaming. Seams are important. They offer control and the ability to partition if necessary. "Frictionless" is OK, as long as friction can be re-imposed if needed.
  • Governments should be extremely cautious of telcos extending 3GPP control mechanisms – especially the core network and slicing – to fixed broadband infrastructure. Fixed broadband is absolutely critical, and complex software dependencies may trade off fine-grained control vs. resilience - and offer additional threat surfaces.
  • Democratising and improving satellite communications looks like an ever more wise move, for all sorts of reasons. It's not a panacea, but it's certainly "air-gapped" as above. 3GPP-based "non-terrestrial" networks, eg based on drones or balloons, also has potential - but will ideally be able to work independently of terrestrial networks if needed.
  • I haven't heard much about LPWAN and LoRa-type networks, but I can imagine that being useful in emergency situations too.
  • Sanctions, trade wars and supply-chain issues are highly unpredictable in terms of intended and unintended consequences. Technology diversity helps mitigate this, alongside supplier diversity in any one network domain.
  • Spectrum policy should enable enough scale economies to ensure good supply of products (and viability of providers), but not *so* much scale that any one option drives out alternatives.
  • The role and impact of international bodies like ITU, GSMA and 3GPP needs careful scrutiny. We are likely to see them become even more political in future. If necessary, there may have to be separate "non-authoritarian" and "authoritarian" versions of some standards (and spectrum policies). De-coupling and de-layering technologies' interdependency - especially radio and core networks - could isolate "disagreements" in certain layers, without undermining the whole international collaboration.
  • There should be a rudimentary basic minimum level of connectivity that uses "old" products and standards. Maybe we need to keep a small slice of 900MHz spectrum alive for generator-powered GSM cells and a box of cheap phones in bunkers - essentially a future variant of Ham Radio.

So to wrap up, I'm ever more convinced that Network Diversity is essential. Not only does it foster innovation, and limit oligopoly risk, but it also enables more options in tragic circumstances. We should also consider the potential risks of too much sophistication and pursuit of effiency and performance at all costs. What happens when things break (or get deliberately broken)?

In the meantime, I'm hoping for a quick resolution to this awful war. Slava Ukraini!

Sidenote: I am currently researching the areas of “technology lock-in” and “path dependence”. In particular, I have been investigating the various mechanisms by which lock-in occurs and strategies for spotting its incipience, or breaking out of it. Please get in touch with me, if this is an area of interest for you.

Thursday, January 06, 2022

Private 4G/5G: Three Markets, Not One

Private 5G segmentation: Introduction & Overview

Private 4G and 5G networks are rapidly becoming mainstream. This isn’t news.

But from recent conversations, client engagements and events, it’s becoming increasingly clear that many don’t quite grasp how private cellular use-cases are segmented – and why it’s going to get even more complex in the next 2-3 years.

In reality, this isn’t really “a market” in a singular sense. It’s currently at least three separate and distinct markets, with only minimal overlap at present. The main common thread is the deployment of cellular (3GPP 4G/5G) networks by non-MNOs.


 

A common fallacy involves talking about “vertical industries” as the main way to divide up the sector. But that doesn’t really work, as any given vertical has dozens of sub-categories and hundreds of potential applications and deployment scenarios. For instance, the “energy vertical” covers everything from a gas station, to an offshore windfarm, a 1000km pipeline or an oil-futures trading floor in a financial district.

Verticals are useful ways to divide up sales and marketing efforts, and make sense for cohesive reports, papers or webinars, but also blend together elements of three very different markets for private 4G/5G:

  •        Critical communications networks
  •        Indoor mobile phone networks
  •        Cloud and IT/IoT networks
No alt text provided for this image

It is worth discussing each of these in turn.

Critical communications networks

These have made up the bulk of major private network deployments over the last 5-10 years. They are typically deployed for utilities, oil & gas, mining, public safety, airports and military purposes. Often, they are used in rugged environments, for human communications (typically push-to-talk), as well as in-vehicle gateways and specific automation systems such as remote sensors and monitoring systems. The specialised GSM-R system for railways fits in this category as well.

Usually, they are replacing alternatives such as private mobile radio (PMR), TETRA and microwave fixed-links. They have typically been packaged and deployed by specialist integrators for sectors like oil-rigs or field-deployment by military units. There is limited “replicability”. They vary widely in size, from a single portable network for public safety, up to a national network for a utility company.

There is little need for interconnection with public mobile networks; indeed it may be specifically avoided in order to maintain isolation for optimal security and “air-gapping” for critical applications.

Most are 4G, reflecting mission-criticality and its frequent need for proven, mature technology and wide product availability. 5G is however used in certain niches and is being tested widely, although the most useful features will only arrive when Release 16/17 versions are commercialised in the next few years.

Indoor mobile phone networks

This includes some of both the oldest and newest deployments. Early local private 2G/3G networks essentially used GSM phones and thin slices of light-licensed/unlicensed spectrum to replace DECT cordless phones in a few markets – notably the UK, Netherlands and Japan.

They could also work with multi-SIM phones to blend public and private modes. I first saw an enterprise-grade GSM picocell in 2001, and an on-premise core network box in 2005. There are still several thousand such networks around, including ones updated to 4G and some that run on ships or onboard private jets.

More recently, there has been growing interest in using private 4G/5G to create neutral host networks for in-building, or on-campus coverage. There are multiple models for neutral host (I’ve counted around 10-15 variations), with some needing a full local network with its own spectrum and core, and others just relying on the tenant MNOs’ active equipment. In the US, CBRS-based options may turn out to be among the more sophisticated.

Whether used to support public MNOs more effectively than alternative indoor systems such as DAS (distributed antenna systems), or perhaps for linking to a UC / UCaaS system for enterprise voice, the main use-cases are for phones. They are almost always deployed for a single building or campus.

This segment is the most likely to require interconnection with the public mobile infrastructure, as well as supporting normal “phone calls” rather than push-to-talk voice.

Cloud and IT/IoT network

This category of private cellular is probably receiving the greatest attention from many newcomers to the sector, as well as external observers such as analysts and journalists.

It ties in with many of the newest trends around cloud and edge-computing, AI and machine vision in factories, robots and AGVs in warehouses, security cameras and more general IoT / smart building use-cases. It aligns with many of the "transformation" projects in IT, plus some parts of the OT (operational technology) space such as smart manufacturing.

As such, it tends to be viewed as a complement – or alternative – to other IT-type network technologies like Wi-Fi and fibre-based ethernet. And given that many of the use-cases have a heavy cloud (or at least multi-site WAN) orientation, there is more acceptance of virtualisation of cores and perhaps in future the RAN.

This is currently the area with the greatest amounts of experimentation and innovation – although actual large-scale operational deployments are still relatively few. There is more focus on 5G than 4G, although that might change as executives learn more about the practicalities and economics. Vendors often orient on the soundbite that "private 5G should be as easy as Wi-Fi".

There is a major focus on automation, replicability and ease-of-use. This was exemplified by the recent AWS Private 5G announcement, which seems squarely aimed at this segment.

However, there is perhaps a divide opening between the IT-type scenarios (where it can be seen as a sort of enterprise Wi-Fi-on-steroids vision) and OT deployments in which it gets embedded into larger industrial automation or other systems, such as factory robots or dockside cranes. In the latter scenarios we can see companies like Siemens integrating cellular into their wider systems, just as they have historically used Wi-Fi/WLAN and fibre.

Although the main focus is on building / campus networks for this model, it may also extend to larger domains such as smart cities, as well as multi-location users such as retail chains.

There is some overlap with the critical communications segment, but that is fairly rare at the moment, especially given the lesser role (and trust) of public cloud in many of those areas.

In addition, there is a fair amount of talk about interconnection with the public mobile network (especially where telcos are acting as vendors), but in reality, that's a secondary consideration that doesn't go much beyond a PowerPoint slide for now. There are certain exceptions which are interesting, but they're far from typical.

Conclusions and the Future of Private Networks Segmentation

At present, the "private 5G market" is actually at least three separate markets. And it's mostly about private 4G rather than 5G. Critical communications networks, indoor mobile phone networks and cloud/IT/IoT networks are largely distinct in terms of motivations, channels, economics, devices and applications. There is much less overlap than many observers expect.

(There are also smaller adjacent sectors such as community networks, 4G/5G-based FWA and other specialities).

But over the next 1-2 years, we can expect the three bubbles on the Venn diagram to overlap more – although asymmetrically. Critical and cloud/IoT networks will start to become hybridised. Critical 4G/5G networks in mines or utility sites will start to support extra IT-like applications, for instance (although that probably won't need formal network slicing).

Some enterprise private cellular networks will examine adding neutral-host and inbound roaming or interconnect from public MNOs' subscribers – although there are assorted regulatory and security/operational hurdles to address.

There won't be much overlap between critical networks and neutral/guest cellular, though. Nobody's smartphone will be roaming from their normal consumer 5G network onto the utility company's private infrastructure, I think. A few employees' devices might have special arrangements though.

But we will also see the emergence of a number of additional bubbles on the chart, some of which are more like "quasi-private" models, such as outdoor neutral host networks, selling wholesale capacity to MNOs. There will be various forms of Wi-Fi integration (but probably less than many expect / want). And we will undoubtedly see maturity of both cloud-delivered private cellular like AWS's, and (belatedly) some sort of MNO-based network slice integration.

And if you want an "outlier" to ponder, consider the potential for grassroots private "consumer-grade" 5G. There's a lot of hype about things like Helium's decentralised and blockchain-based model, but I'm deeply sceptical of this (that's for another post, though). More likely is the emergence of a true Wi-Fi hotspot approach, where we start to see lightweight "free 5G" options, using unlicensed (or maybe CBRS GAA) spectrum, with a cheap core and small cell. Scan the QR code next to the barista to download your eSIM, and you're good to go….

 



The bottom line is that the private 4G/5G market is complex and nuanced. Market statistics frequently combine everything from a nationwide utility's or railway's critical infrastructure, to a few small-cells connecting up digital signs in a mall car-park. It's easy to assume it's all about millisecond-latency robots zipping about factories, rather than a security guard with a handheld radio, or indoor network coverage for a hotel.

Operators, vendors, enterprises and governments need to delve a bit more deeply than just talking about "verticals" for private cellular, or else they risk making errors with their product portfolios or regulatory direction.

Dean Bubley (@disruptivedean) is a wireless technology analyst & futurist, who advises a broad range of companies and institutions active in the 5G, Wi-Fi and cloud marketplaces. He has covered private cellular networks for more than 20 years. He is a regular speaker and moderator at live and virtual events. Please get in touch on LinkedIn or via information AT disruptive-analysis DOT com for advisory or speaking requests.

#Private5G #Private4G #CriticalCommunications #5G #IoT #IIoT #Cloud #WiFi #verticals

Monday, November 29, 2021

Update: Recent Posts & Themes

(This article was initally posted on my LinkedIn newsletter. If you are not already signed up, please subscribe here)

I have a couple of other deep-dive themes cued up for articles in coming weeks, but I wanted to put out a quick newsletter update covering a few recent themes, posts and events that have been occupying me.


 

The last month has featured a lot of thinking, speaking & client engagements on private 5G, infrastructure-sharing and neutral-host business models, network slicing and capability/API exposure, Wi-Fi 6E & 6GHz, Open RAN and the interaction of cellular & other wireless technologies.

Some recent short-form posts that you may have missed:

  • Telecom operators (and their partners & regulators) should be giving as much consideration to *buying* APIs and capabilities as selling them - LINK
  • Thoughts on the Ericsson / Vonage acquisition - LINK
  • Should we be thinking more about "micro-churn" incidents, where subscribers temporarily switch between operators, using technologies such as eSIM? - LINK
  • Want me to speak at, or moderate your 2022 event? Or present at an internal workshop or offsite? - LINK
  • RCS messaging is still a purposeless zombie technology, continuing to eat brains after 13 years. Google's involvement hasn't changed much - LINK
  • The telecoms industry still hasn't gone beyond telephony, to think more broadly about "voice" services & applications - LINK

I've been to a couple of recent "verticals" events, about networking in ports and for railways. There's a lot of interest in private cellular - but also a huge amount of emphasis on Wi-Fi, including specialised versions with 60GHz or unique forms of QoS intended for industrial or trackside use.

I also presented on a webinar recently on behalf of iBwave, about the scope for Private 4G/5G networks for utilities and energy companies (LINK to view on-demand). Watch out for an upcoming eBook on the same topic. Another webinar on the competiton/convergence between Wi-Fi6 and 5G was for Spirent (LINK


 

Scott and Iain at Telecoms.com invited me onto their weekly podcast for a (rather irreverent) chat about the current trends and news from the industry, over a couple of beers. We took aim at 5G, the Metaverse, Open RAN & a lot more. YouTube link embedded above!

In addition, I moderated a panel on Infrastructure Sharing for the 5G Techritory event. I'm not sure if an archived version will be put online, but keep a watch out for it here.

And on a personal note, I also took part in my first improv comedy performance. If you book me to speak at one of your events, I can't promise to wear the same shirt as in the picture, but I will certainly be happy to make things up on the spot spontaneously, or deal with any hecklers ruthlessly!

#5G #WiFi #verticals #PrivateLTE #Private5G #mobile #telecoms #spectrum #voice #messaging #networkslicing #neutralhost #regulation