<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-1834236085756782640</atom:id><lastBuildDate>Mon, 13 Apr 2026 16:18:42 +0000</lastBuildDate><category>LTE</category><category>5G</category><category>Videos</category><category>Technical Details</category><category>Mobile Phones and Devices</category><category>Stats</category><category>Apps</category><category>LTE &amp; 5G World Series</category><category>3GPP</category><category>Femtocells</category><category>Spectrum</category><category>Network Architecture</category><category>4G</category><category>Conferences and Events</category><category>Signalling</category><category>Future Technologies</category><category>LTE-Advanced</category><category>Qualcomm</category><category>Ericsson</category><category>White Papers and Reports</category><category>Cambridge Wireless (CW)</category><category>Small Cells</category><category>Wi-Fi</category><category>Security</category><category>NTT DoCoMo</category><category>Internet of Things</category><category>Release 10</category><category>Release 8</category><category>WiMAX</category><category>IMS</category><category>M2M</category><category>Operators</category><category>Release 11</category><category>Samsung</category><category>Huawei</category><category>Broadband</category><category>Nokia Networks</category><category>Release 12</category><category>HSPA+</category><category>LTE Voice and SMS Issues</category><category>Release 9</category><category>Mobile Humour</category><category>Release 16</category><category>SON</category><category>Mobile TV</category><category>Mobile World Congress</category><category>(e)MBMS</category><category>Antennas</category><category>General</category><category>Alcatel-Lucent</category><category>HSPA</category><category>GSMA</category><category>MBB</category><category>Mobile Data</category><category>Japan</category><category>TDD</category><category>USA</category><category>VoLTE</category><category>Backhaul</category><category>Carrier Aggregation</category><category>GSM</category><category>Apps SMS</category><category>UMTS</category><category>China</category><category>MIMO</category><category>Rollouts</category><category>UK</category><category>Emergency</category><category>Google</category><category>India</category><category>ETSI</category><category>6G</category><category>Testing</category><category>Vodafone</category><category>Release 17</category><category>Satellite Communications</category><category>Smartphones</category><category>Tutorials</category><category>Data Traffic Management</category><category>EPS</category><category>iPhone</category><category>Market Analysis</category><category>TCP/IP</category><category>IEEE</category><category>Nokia</category><category>Release 13</category><category>BT / EE</category><category>Concept Mobile</category><category>HetNets</category><category>Release 15</category><category>SIM</category><category>TD-LTE</category><category>Deployment</category><category>Rohde and Schwarz</category><category>Telefonica</category><category>5G-Advanced</category><category>Connected World</category><category>Artificial Intelligence</category><category>China Mobile</category><category>Handovers</category><category>QoS</category><category>Release 18</category><category>Release 7</category><category>Roaming</category><category>SDN / NFV</category><category>Standards</category><category>5GS</category><category>Environment and Green Issues</category><category>Future Networks</category><category>ITU</category><category>RRC</category><category>Network Optimisation</category><category>Orange</category><category>Public Safety Comm</category><category>5G Americas</category><category>Africa</category><category>Bluetooth</category><category>Open RAN</category><category>Keysight (Agilent)</category><category>South Korea</category><category>Training</category><category>AR / VR / MR / XR</category><category>Battery</category><category>HSDPA</category><category>Network Slicing</category><category>Small Cell Forum</category><category>Camera</category><category>IMT-Advanced</category><category>Trends</category><category>Ubiquisys</category><category>Deutsche Telekom</category><category>LG</category><category>Motorola</category><category>OTT</category><category>Parallel Wireless</category><category>Release 14</category><category>UICC</category><category>Android</category><category>Edge and Fog Computing</category><category>Interdigital</category><category>Meta</category><category>NEC</category><category>Network Infrastructure</category><category>Twitter Discussion</category><category>VoIP</category><category>ZTE</category><category>5G Stand-Alone</category><category>AT&amp;T</category><category>Apps Camera</category><category>Apps Healthcare</category><category>FMC</category><category>LBS</category><category>Use Cases</category><category>3G</category><category>4.5G</category><category>Apps Security</category><category>Europe</category><category>Fibre Optics</category><category>Forecast</category><category>IET</category><category>Infrastructure Vendor</category><category>Mpirical</category><category>Network Sharing</category><category>Private Networks</category><category>TD-SCDMA</category><category>Advertisement</category><category>D2D</category><category>Data Speeds</category><category>Diameter</category><category>Femtocell Applications</category><category>IMS Services</category><category>Machine Learning</category><category>OS</category><category>ProSe</category><category>C-RAN</category><category>Cellular IoT</category><category>Cisco</category><category>Data Offload</category><category>Health</category><category>IPR</category><category>NGMN</category><category>OFDM</category><category>Revenues</category><category>T-Mobile USA</category><category>V2X</category><category>AI</category><category>Billing</category><category>CSFB</category><category>Case Studies</category><category>Cloud Computing</category><category>Codecs</category><category>Cognitive radio</category><category>IMT-2020</category><category>Interference Management</category><category>LTE-Advanced Pro</category><category>LoRaWAN</category><category>NGAP</category><category>Simulators</category><category>Sony Ericsson</category><category>URLLC</category><category>Blackberry</category><category>CoMP</category><category>FOKUS FUSECO Forum</category><category>GPRS</category><category>GPS</category><category>History</category><category>Picocells</category><category>Sprint</category><category>TIP</category><category>UWB</category><category>vRAN</category><category>AIPN</category><category>Anritsu</category><category>Apps Location</category><category>F1AP</category><category>GSA</category><category>HSUPA</category><category>HTC</category><category>IPX</category><category>IPv6</category><category>NFC</category><category>Pricing</category><category>Release 19</category><category>Rural Communications</category><category>Softbank</category><category>TETRA</category><category>Telehealth</category><category>UMA</category><category>VoLGA</category><category>April Fools&#39; Day</category><category>Awards and Prizes</category><category>Base Station</category><category>Big Data</category><category>Books</category><category>Energy Consumption and Savings</category><category>Handover</category><category>IIoT</category><category>KT</category><category>Keima</category><category>MDT</category><category>Metrocell</category><category>Microsoft</category><category>NB-IoT</category><category>O2</category><category>Railway Communications</category><category>Release 6</category><category>SRVCC</category><category>SS7</category><category>Short Range Wireless</category><category>Sigfox</category><category>SmartWear</category><category>Timing and Phase</category><category>UMB</category><category>Verizon</category><category>802.11</category><category>APIs</category><category>Apps Browsing</category><category>Apps Search</category><category>DAS</category><category>DVB-H</category><category>E1AP</category><category>Interference Avoidance</category><category>Mindspeed</category><category>Nortel</category><category>PCRF</category><category>Predictions</category><category>Relays</category><category>SKT</category><category>Screen and Display</category><category>Smart Grids</category><category>Smart Home and Cities</category><category>5G-ACIA</category><category>Ad-Hoc Networks</category><category>Apps Adult</category><category>Apps Broadcast</category><category>Apps Messaging</category><category>Apps SocNet</category><category>Apps Video Streaming</category><category>China Telecom</category><category>ETWS</category><category>GCF</category><category>IDATE Digiworld</category><category>LCS</category><category>LIPA</category><category>Laptops</category><category>Licensing</category><category>MediaFLO</category><category>Mobile Cloud</category><category>NG RAN</category><category>NGN</category><category>Quantum Technology</category><category>RAN</category><category>RRC Inactive State</category><category>SC-FDMA</category><category>SIPTO</category><category>Unlicensed LTE</category><category>WWC</category><category>Whitespaces</category><category>eCall</category><category>mmWave</category><category>5G Non-Stand Alone</category><category>ATIS</category><category>Apps Car</category><category>Apps Content</category><category>Apps MMS</category><category>Browsers</category><category>Drones &amp; UAVs</category><category>EDGE</category><category>EN-DC</category><category>Fixed Wireless Access</category><category>FlashLinq</category><category>GRX</category><category>High Frequency Technologies</category><category>ICIC</category><category>IFOM</category><category>Industry 4.0</category><category>KDDI</category><category>LPWAN</category><category>LTE-M</category><category>Latin America</category><category>Logos</category><category>Marketing</category><category>Mesh Technology</category><category>NR</category><category>O-RAN</category><category>OMA</category><category>Open Source</category><category>PWS</category><category>Positioning</category><category>QoE</category><category>RAN Sharing</category><category>Robotics and Automation</category><category>SDR</category><category>SIP</category><category>Synchronization</category><category>Three UK</category><category>VoNR</category><category>VoWiFi</category><category>Voice Communications</category><category>WebRTC</category><category>ZigBee</category><category>5GPPP</category><category>802.11ax</category><category>802.11n</category><category>802.20</category><category>A-GPS</category><category>ANDSF</category><category>Apps Banking</category><category>Apps Barcodes</category><category>Apps Dating</category><category>Apps Financial</category><category>Apps Games</category><category>Apps M-Commerce</category><category>Apps Mobile Payments</category><category>Apps Video Calling</category><category>Apps Video Sharing</category><category>Broadcom</category><category>Buildings and Materials</category><category>CMMB</category><category>Dual Connectivity (DC)</category><category>ENUM</category><category>Firefox OS</category><category>Fixed Network</category><category>GELTE</category><category>IDC</category><category>IETF</category><category>Intel</category><category>KPI</category><category>Kids Mobile</category><category>LGU+</category><category>LSTI</category><category>Lawful Intercept</category><category>LiFi</category><category>MRDC</category><category>MSF</category><category>MediaTek</category><category>NR RRC</category><category>Network Automation</category><category>P2P</category><category>Projectors</category><category>Push Services</category><category>RCS</category><category>RIC</category><category>ROHC</category><category>Regulations</category><category>Reliance Jio</category><category>S1AP</category><category>SCaaS</category><category>Smartwatches</category><category>TTCN</category><category>Tech Laws</category><category>Transforma Insights</category><category>WiTricity</category><category>Wray Castle</category><category>eMBB</category><category>intra-gNB Handover</category><category>mMTC</category><category>ABI Research</category><category>Analysys Mason</category><category>Apple</category><category>Apps Books</category><category>Apps Keeping Fit</category><category>Apps Music</category><category>Apps Speech Recognition</category><category>Apps Speech Translation</category><category>Apps Wallet</category><category>CMAS</category><category>CPC</category><category>CSN</category><category>Capex and Opex</category><category>China Unicom</category><category>Converged Devices</category><category>Datacentre</category><category>EPS Fallback</category><category>Elisa</category><category>FRMCS</category><category>Fast Dormancy</category><category>Finland</category><category>Forum Oxford</category><category>France</category><category>GNSS</category><category>Germany</category><category>HSDPA Mobile</category><category>HSS</category><category>Hong Kong</category><category>IBM</category><category>IPTV</category><category>IWLAN</category><category>Inflight Communication</category><category>KaiOS</category><category>Luxury Mobile</category><category>MCN</category><category>MOCN</category><category>MORAN</category><category>MVNO</category><category>Metaverse</category><category>Multi-Band Cell</category><category>OSA</category><category>Ooredoo</category><category>Pagers</category><category>QoS Flow</category><category>Quintel</category><category>Rakuten</category><category>Receivers</category><category>RedCap</category><category>Religion</category><category>Road Safety</category><category>SS8</category><category>SSAC</category><category>Taiwan</category><category>Telstra</category><category>Triple-play</category><category>UMPC</category><category>UPCON</category><category>USSD</category><category>User Data Convergence</category><category>User Interface</category><category>Utilities</category><category>VCC</category><category>Voice over New Radio</category><category>WPAN</category><category>WUSB</category><category>Webinar</category><category>Windows Mobile</category><category>XGP</category><category>XnAP</category><category>iBurst</category><category>inter-gNB-CU Handover</category><category>5G NR-Unlicensed</category><category>5QI</category><category>802.11ac</category><category>802.11p</category><category>802.16n</category><category>802.22</category><category>AI-RAN</category><category>AIS</category><category>APAC</category><category>Airspan</category><category>Amazon</category><category>Anomaly Detection</category><category>Anzafrika</category><category>Appledore Research</category><category>Apps Alarm</category><category>Apps Art</category><category>Apps Comics</category><category>Apps Education</category><category>Apps Family</category><category>Apps Love Detector</category><category>Apps Military</category><category>Apps News</category><category>Apps Plane</category><category>Apps Recognition</category><category>Apps Ringtones</category><category>Apps Scanners</category><category>Apps Testing</category><category>Apps USSD</category><category>Apps Voicemail</category><category>Apps Wireless Memory</category><category>Arthur D Little</category><category>Asia</category><category>Asus</category><category>Austria</category><category>Blockchain</category><category>Broadband Forum</category><category>C-RNTI</category><category>CAMEL</category><category>CBRS</category><category>CBS</category><category>CCS Insight</category><category>CDMA2000</category><category>CET</category><category>COVID-19</category><category>CTIA08</category><category>CUPS</category><category>Canada</category><category>Change of gNB-CU-UP</category><category>Cloud Native</category><category>Cognitive Computing</category><category>Conditional Handover</category><category>Connection Release</category><category>DMB</category><category>DTTB</category><category>Dell Technologies</category><category>Dell’Oro Group</category><category>Democratic Republic of the Congo</category><category>Densification</category><category>Digital Twin</category><category>Diversity</category><category>EENA</category><category>EME</category><category>Event A6</category><category>FOMA</category><category>Far EasTone</category><category>Firecell</category><category>Free France</category><category>GBRSS</category><category>GTPv2</category><category>Gartner</category><category>GenAI</category><category>General Motors</category><category>Geolocation</category><category>HDLLC</category><category>HMTC</category><category>HPE</category><category>HTML5</category><category>HWN</category><category>Helium</category><category>ICS/OT</category><category>IDDA 3</category><category>IPXS</category><category>ISR</category><category>Indoor Connectivity</category><category>Industrial Automation</category><category>Iskratel</category><category>KPN</category><category>Kenya</category><category>L4S</category><category>Layer 2 Measurements</category><category>Linux Foundation</category><category>MBWA</category><category>MEMS</category><category>MMTel</category><category>MSR</category><category>MTN</category><category>Mans LMT</category><category>Maritime Communications</category><category>Mavenir</category><category>Memory</category><category>Microwave</category><category>Mobsessed</category><category>N26</category><category>NETSCOUT nGenious Session Analyzer</category><category>NG-1</category><category>NVIDIA</category><category>Netherlands</category><category>Network Analytics</category><category>Network Transformation</category><category>Nigeria</category><category>OSS/BSS</category><category>Ofinno</category><category>Omdia</category><category>Oppo</category><category>Oracle</category><category>PCC</category><category>PDN Connections</category><category>PPAC</category><category>PenHertz</category><category>Primary Cell</category><category>Quad-play</category><category>RACS</category><category>RAN Intelligence Controller</category><category>RAN Intelligent Controller</category><category>RF Front-End</category><category>RLF</category><category>Radio Design</category><category>Radio Link Failure</category><category>Radisys</category><category>Red Hat</category><category>Robert Bosch</category><category>Rysavy Research</category><category>SAMOG</category><category>SDWN</category><category>STC</category><category>Secondary Cell</category><category>SecurityGen</category><category>Site Pyo</category><category>Skills</category><category>Smart Farming</category><category>Special Cell</category><category>Strategy Analytics</category><category>Supermicro</category><category>Sweden</category><category>Swisscom</category><category>Switzerland</category><category>Symbian</category><category>T-Systems</category><category>TIM</category><category>TSN</category><category>Tariff</category><category>Tech Quotes</category><category>Telenor</category><category>Terahertz</category><category>Thailand</category><category>Thales Alenia Space</category><category>Top Posts</category><category>Toyota</category><category>Transport Network</category><category>Trivergence</category><category>Turkcell</category><category>UCMF</category><category>UE Radio Capability ID</category><category>UIC</category><category>UNIDO</category><category>Underwater Wireless</category><category>United Nations</category><category>VMware</category><category>WUS/WUR</category><category>Wave by AGC</category><category>Wi-SUN</category><category>X2AP</category><category>XDD</category><category>Xiaomi</category><category>cell trace</category><category>e-tumba</category><category>eHRPD</category><category>gNB-DU</category><category>iBasis</category><category>iTK</category><category>inter-gNB-DU Handover</category><title>The 3G4G Blog</title><description>Latest News and Information on 4G, 5G, 6G, and other Wired &amp;amp; Wireless Technologies in General.</description><link>https://blog.3g4g.co.uk/</link><managingEditor>noreply@blogger.com (Zahid Ghadialy)</managingEditor><generator>Blogger</generator><openSearch:totalResults>2109</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1834236085756782640.post-2216419848241884913</guid><pubDate>Thu, 09 Apr 2026 06:35:00 +0000</pubDate><atom:updated>2026-04-09T21:06:34.482+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">3GPP</category><category domain="http://www.blogger.com/atom/ns#">5G</category><category domain="http://www.blogger.com/atom/ns#">5G-Advanced</category><category domain="http://www.blogger.com/atom/ns#">LTE</category><category domain="http://www.blogger.com/atom/ns#">LTE-Advanced</category><category domain="http://www.blogger.com/atom/ns#">LTE-Advanced Pro</category><category domain="http://www.blogger.com/atom/ns#">Release 19</category><category domain="http://www.blogger.com/atom/ns#">Standards</category><category domain="http://www.blogger.com/atom/ns#">Technical Details</category><title>3GPP Release 19 Description and Summary of Work Items</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhhqwEORydRnBRtjiuaVJ0baFCuJ9LGFO_J5ip0hDNn5ukyGvKVJFX-VXUOyioxBUq3fKm8yRICTLyUgytHxhvwvHEGkpS8iQnZWyB0RW5FfEtFvYrOgRO7o5indQFBkAbcM8dOfayqVg7-a4bpgdYPpO20L6aslU2ThRXkeuHL6zBZfDgcGKQzYZlfNrI/s1920/3GPP_Release19_Priorities.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1080&quot; data-original-width=&quot;1920&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhhqwEORydRnBRtjiuaVJ0baFCuJ9LGFO_J5ip0hDNn5ukyGvKVJFX-VXUOyioxBUq3fKm8yRICTLyUgytHxhvwvHEGkpS8iQnZWyB0RW5FfEtFvYrOgRO7o5indQFBkAbcM8dOfayqVg7-a4bpgdYPpO20L6aslU2ThRXkeuHL6zBZfDgcGKQzYZlfNrI/w640-h360/3GPP_Release19_Priorities.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;As the journey towards 3GPP Release 20 and 6G (3GPP Rel-21) continues to gather pace, the recently concluded Release 19 comes with a clearer view of what the next phase of 5G evolution, often referred to as 5G-Advanced, will look like in practice. One of the most useful artefacts in this process is the recently published technical report &lt;a href=&quot;https://www.3gpp.org/ftp/Specs/archive/21_series/21.919&quot; target=&quot;_blank&quot;&gt;3GPP TR 21.919&lt;/a&gt;, which offers a consolidated snapshot of the features and work items currently shaping this release.&lt;/p&gt;&lt;p&gt;Rather than focusing on detailed specifications, this report takes a step back and provides accessible summaries of the agreed work items. Each summary is intended to answer two simple but important questions: what problem is being addressed, and what impact the feature will have on the overall system. This makes the document particularly valuable not only for specialists deeply involved in standardisation work, but also for a broader audience trying to keep track of where the industry is heading.&lt;/p&gt;&lt;p&gt;It is worth noting that this is still very much a work in progress (50% complete). At the time of publication, just over 60 summaries have been included, with many more expected in future updates. Even so, the current version already highlights the sheer breadth of activity in Release 19, spanning everything from energy efficiency and non-terrestrial networks to AI, immersive services, and advanced radio capabilities.&lt;/p&gt;&lt;p&gt;In this post, I will not attempt to reinterpret or condense the summaries themselves. Instead, I am sharing the full list of topics covered in the report below, which provides a useful index into the areas that 3GPP worked on as part of Release 19.&lt;/p&gt;&lt;p&gt;It should be noted that the technical report (TR) presents the &quot;initial state&quot; of the Features introduced in Release 19, i.e. as they are by the time of publication of this document. Each Feature is subject to be later modified or enhanced, over several years, by the means of Change Requests (CRs). To further outline a feature at a given time, it is recommended to retrieve all the CRs which relate to the given Feature, as explained in its Reference section.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Below is the list of all topics covered in this report. Some of the topics may be missing a summary, which will be added later in the later updates.&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;&lt;b&gt;5&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;Rel-19 Energy Efficiency, Energy Saving&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;5.1&amp;nbsp; &amp;nbsp;Enhancements of Network energy savings for NR&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;5.2&amp;nbsp; &amp;nbsp;Low-power wake-up signal and receiver for NR (LP-WUS/WUR)&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;5.3&amp;nbsp; &amp;nbsp;Energy Efficiency as Service Criteria&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;&lt;b&gt;6&amp;nbsp; &amp;nbsp;Rel-19 Satellite (5GSAT), NTN, UAS, Aerial&lt;/b&gt;&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;6.1&amp;nbsp; &amp;nbsp;Satellite access Phase 3&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;6.1.1&amp;nbsp; &amp;nbsp;Security Aspects of 5G Satellite Access Phase 3&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;6.1.2&amp;nbsp; &amp;nbsp;Charging aspects of satellite access Phase 3&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;6.2&amp;nbsp; &amp;nbsp;Non-Terrestrial Networks (NTN) for NR Phase 3&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;6.3&amp;nbsp; &amp;nbsp;Enhancements for Air-to-ground network for NR&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;6.4&amp;nbsp; &amp;nbsp;Inter-RAT mode mobility support from E-UTRAN TN to NR NTN&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;6.5&amp;nbsp; &amp;nbsp;Non-Terrestrial Networks (NTN) for Internet of Things (IoT) Phase 3 (for LTE)&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;6.6&amp;nbsp; &amp;nbsp;Introduction of IoT-NTN TDD mode&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;6.7&amp;nbsp; &amp;nbsp;Enhanced requirements and test methodology for NR NTN and IoT NTN&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;6.8&amp;nbsp; &amp;nbsp;On-demand broadcast of GNSS assistance data&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;6.9&amp;nbsp; &amp;nbsp;Uncrewed Aerial System Phase 3&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;6.10&amp;nbsp; &amp;nbsp;Support for PWS in Satellite E-UTRAN and Satellite NG-RAN&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;6.11&amp;nbsp; &amp;nbsp;Introduction of BDS (BeiDou Navigation Satellite System) B2b Signal in A-GNSS for LTE and NR&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;6.12&amp;nbsp; &amp;nbsp;Introduction of A-GNSS support for NavIC (Navigation with Indian Constellation) L1 SPS (Standard Positioning Service) in NR &amp;amp; LTE&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;6.13&amp;nbsp; &amp;nbsp;Management Aspects of Rel-18&#39;s NTN Phase 2&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;6.14&amp;nbsp; &amp;nbsp;Lower Selection-priority for PLMN Selection&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;6.15&amp;nbsp; &amp;nbsp;New LTE band for 5G broadcast for region 3 utilizing a geosynchronous satellite&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;6.16&amp;nbsp; &amp;nbsp;Satellite band-related items&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;6.16.1&amp;nbsp; &amp;nbsp;Introduction of Ku bands for NR NTN&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;6.16.2&amp;nbsp; &amp;nbsp;Introduction of additional operating NR bands for HAPS (High Altitude Platform Station)&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;6.16.3&amp;nbsp; &amp;nbsp;Introduction of another NR NTN S-band (MSS band 2000-2020 MHz UL and 2180-2200 MHz DL)&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;6.16.4&amp;nbsp; &amp;nbsp;New NR NTN bands to support Extended L-band and combined MSS L-band and Extended L-band ranges&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;6.16.5&amp;nbsp; &amp;nbsp;Introduction of another IoT-NTN S-band (MSS band 2000-2020 MHz UL and 2180-2200 MHz DL)&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;&lt;b&gt;7&amp;nbsp; &amp;nbsp;Rel-19 Internet of Things (IoT) and Reduced Capability (RedCap) UE&lt;/b&gt;&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;7.1&amp;nbsp; &amp;nbsp;NR power class 2 RedCap (Reduced Capability) UE in FR1&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;7.2&amp;nbsp; &amp;nbsp;NAS layer overhead reduction for data transfer using CP CIoT&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;7.3&amp;nbsp; &amp;nbsp;Management Aspects of RedCap features&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;&lt;b&gt;8&amp;nbsp; &amp;nbsp;Ambient power-enabled Internet of Things (IoT)&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;8.1&amp;nbsp; &amp;nbsp;Ambient power-enabled Internet of Things (IoT) (SA and CT)&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;8.1.1&amp;nbsp; &amp;nbsp;Charging for Ambient power-enabled Internet of Things&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;8.1.2&amp;nbsp; &amp;nbsp;Security Aspects of Ambient IoT Services in 5G for Isolated Private Networks&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;8.2&amp;nbsp; &amp;nbsp;Solutions for Ambient IoT (Internet of Things) in NR&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;&lt;b&gt;9&amp;nbsp; &amp;nbsp;Rel-19 Artificial Intelligence (AI)/Machine Learning (ML)&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;9.1&amp;nbsp; &amp;nbsp;AI/ML Model Transfer Phase 2&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;9.2&amp;nbsp; &amp;nbsp;Core Network Enhanced Support for Artificial Intelligence (AI)/Machine Learning (ML)&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;9.3&amp;nbsp; &amp;nbsp;Application enablement for AI/ML services&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;9.4&amp;nbsp; &amp;nbsp;Artificial Intelligence (AI)/Machine Learning (ML) for NR air interface&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;9.5&amp;nbsp; &amp;nbsp;Artificial Intelligence (AI)/Machine Learning (ML) for NR air interface&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;9.6&amp;nbsp; &amp;nbsp;Enhancements for Artificial Intelligence (AI)/Machine Learning (ML) for NG-RAN&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;9.7&amp;nbsp; &amp;nbsp;AI/ML Management Phase 2&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;9.8&amp;nbsp; &amp;nbsp;Protocol for AI Data Collection from UPF&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;&lt;b&gt;10&amp;nbsp; &amp;nbsp;Rel-19 Verticals and Non Public Network&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;10.1&amp;nbsp; &amp;nbsp;Rel-19 Enhancements of 3GPP Northbound and Application Layer Interfaces and APIs&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;10.2&amp;nbsp; &amp;nbsp;SEAL DD (Data Delivery) Phase 2&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;10.3&amp;nbsp; &amp;nbsp;Common Application Programming Interface (API) Framework (CAPIF) Phase 3&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;10.4&amp;nbsp; &amp;nbsp;Enhanced OAM for management service exposure to external consumers through CAPIF&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;10.5&amp;nbsp; &amp;nbsp;Non-Public Network (NPN) security considerations&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;10.6&amp;nbsp; &amp;nbsp;Security for PLMN hosting a NPN&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;10.7&amp;nbsp; &amp;nbsp;Interconnect of SNPN&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;10.8&amp;nbsp; &amp;nbsp;ProSe support in NPN&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;&lt;b&gt;11&amp;nbsp; &amp;nbsp;Rel-19 communications services&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;11.1&amp;nbsp; &amp;nbsp;Media Messaging Enhancements&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;11.2&amp;nbsp; &amp;nbsp;Terminal Audio quality performance and Test methods for Immersive Audio Services, Phase 2&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;11.3&amp;nbsp; &amp;nbsp;EVS Codec Extension for Immersive Voice and Audio Services, Phase 2&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;11.4&amp;nbsp; &amp;nbsp;5GMSG Service phase 3&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;11.5&amp;nbsp; &amp;nbsp;Video Operating Points - Harmonization and Stereo MV-HEVC&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;11.6&amp;nbsp; &amp;nbsp;Advanced Media Delivery&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;11.7&amp;nbsp; &amp;nbsp;5G Real-time Transport Protocol Configurations, Phase 2&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;11.8&amp;nbsp; &amp;nbsp;Next Generation Real time Communication services Phase 2&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;11.8.1&amp;nbsp; &amp;nbsp;System architecture for Next Generation Real time Communication services Phase 2&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;11.8.2&amp;nbsp; &amp;nbsp;Security support for the Next Generation Real Time Communication services Phase 2&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;11.8.3&amp;nbsp; &amp;nbsp;Application enablement aspects for MMTel&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;&lt;b&gt;12&amp;nbsp; &amp;nbsp;Rel-19 XR (eXtended Reality), Augmented Reality (AR), Metaverse, Edge Computing&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;12.1&amp;nbsp; &amp;nbsp;Localized Mobile Metaverse Services&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;12.2&amp;nbsp; &amp;nbsp;Extended Reality and Media&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;12.3&amp;nbsp; &amp;nbsp;XR (eXtended Reality) for NR Phase 3&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;12.4&amp;nbsp; &amp;nbsp;Avatar Communications in AR Calls&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;12.5&amp;nbsp; &amp;nbsp;Split rendering over IMS&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;12.6&amp;nbsp; &amp;nbsp;Enhancement of support for Edge Computing in 5G Core network - Phase 3&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;12.7&amp;nbsp; &amp;nbsp;Edge Computing for Industrial Scenarios&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;12.8&amp;nbsp; &amp;nbsp;Edge Computing Considering the Operational Needs of Service Hosting Environment&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;12.9&amp;nbsp; &amp;nbsp;Architecture for enabling Edge Applications Phase 3&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;&lt;b&gt;13&amp;nbsp; &amp;nbsp;Rel-19 High Power UEs (HPUE)&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;13.1&amp;nbsp; &amp;nbsp;Rel-19 High power UE (power class 1.5 or 2) for NR intra-band CA or NR inter-band CA/DC band combinations with/without NR Supplementary Uplink (UL)&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;13.2&amp;nbsp; &amp;nbsp;Rel-19 High power UE (power class 1.5 and 2) for NR FR1 TDD/FDD single band for handheld/FWA UEs, and high power UE operation (power class 1) for FWVM (fixed-wireless/vehicle-mounted) use cases in a single NR band&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;13.3&amp;nbsp; &amp;nbsp;Introduction of Power Class 2 and UE 40MHz Channel Bandwidth in NR band n28&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;13.4&amp;nbsp; &amp;nbsp;Rel-19 High power UE (power class 1.5 or 2) for DC combinations of LTE band(s) and NR band(s)&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;13.5&amp;nbsp; &amp;nbsp;Rel-19 High power UE (power class 2) and high power operation (power class 1) for fixed-wireless/vehicle-mounted use cases in a single LTE band&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;&lt;b&gt;14&amp;nbsp; &amp;nbsp;Rel-19 RAN topology&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;14.1&amp;nbsp; &amp;nbsp;5G NR Femto&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;14.2&amp;nbsp; &amp;nbsp;Additional topological enhancements for NR&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;14.3&amp;nbsp; &amp;nbsp;Vehicle Mounted Relays Phase 2&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;&lt;b&gt;15&amp;nbsp; &amp;nbsp;Rel-19 Sidelink, Proximity&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;15.1&amp;nbsp; &amp;nbsp;NR sidelink multi-hop relay&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;15.2&amp;nbsp; &amp;nbsp;UE-to-UE multi-hop relay&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;15.3&amp;nbsp; &amp;nbsp;NR Sidelink: Intra-band Carrier Aggregation in ITS band&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;15.4&amp;nbsp; &amp;nbsp;Charging Aspects of Ranging and Sidelink Positioning&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;15.5&amp;nbsp; &amp;nbsp;Multi-path relay&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;15.6&amp;nbsp; &amp;nbsp;Proximity-based Services in 5GS Phase 3&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;&lt;b&gt;16&amp;nbsp; &amp;nbsp;NR and LTE Dual Connectivity (DC)&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;16.1&amp;nbsp; &amp;nbsp;UE RF enhancements for NR FR1/FR2 and EN-DC, Phase 4&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;16.2&amp;nbsp; &amp;nbsp;Support of intra-band non-collocated EN-DC/NR-CA deployment Phase2: new receiver type(s)&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;16.3&amp;nbsp; &amp;nbsp;Rel-19 downlink interruption for NR and EN-DC band combinations at dynamic Tx Switching in Uplink&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;16.4&amp;nbsp; &amp;nbsp;Rel-19 DC of x LTE band(s), y NR band(s) (1&amp;lt;=x&amp;lt;6, 1&amp;lt;=y&amp;lt;6, x+y&amp;lt;=6) and single or two NR Supplementary Uplink (SUL) bands&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;16.5&amp;nbsp; &amp;nbsp;Simultaneous Rx/Tx band combinations for NR CA/DC, NR SUL and LTE/NR DC in Rel-19&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;16.6&amp;nbsp; &amp;nbsp;UE Conformance - Rel-19 NR CA and DC; and NR and LTE DC Configurations&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;&lt;b&gt;17&amp;nbsp; &amp;nbsp;Rel-19 Other NR and LTE Radio&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;17.1&amp;nbsp; &amp;nbsp;Adding channel bandwidth(s) support to existing NR bands and CA/ENDC combinations in REL-19&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;17.2&amp;nbsp; &amp;nbsp;Data collection for SON (Self-Organising Networks)/MDT (Minimization of Drive Tests) in NR standalone and MR-DC (Multi-Radio Dual Connectivity) Phase 4&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;&lt;b&gt;18&amp;nbsp; &amp;nbsp;Rel-19 NR Radio&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;18.1&amp;nbsp; &amp;nbsp;NR mobility enhancements Phase 4&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;18.2&amp;nbsp; &amp;nbsp;Evolution of NR duplex operation: Sub-band full duplex (SBFD)&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;18.3&amp;nbsp; &amp;nbsp;NR Radio Resource Management (RRM) Phase 5&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;18.4&amp;nbsp; &amp;nbsp;Multi-carrier enhancements for NR Phase 3&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;18.5&amp;nbsp; &amp;nbsp;NR demodulation performance Phase 5&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;18.6&amp;nbsp; &amp;nbsp;NR MIMO Phase 5&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;18.7&amp;nbsp; &amp;nbsp;FR1 TRP, TRS and MIMO OTA testing enhancement Phase 3&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;18.8&amp;nbsp; &amp;nbsp;Rel-19 NR CA/DC for x bands DL with y bands UL (x&amp;lt;7, y&amp;lt;3) and SUL/CA band combinations with a single SUL or two SUL cells&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;18.9&amp;nbsp; &amp;nbsp;Low band carrier aggregation via switching&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;18.10&amp;nbsp; NR channel BW less than 5MHz for FR1 Phase 2&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;18.11&amp;nbsp; mmWave in NR: UE spurious emissions and EESS (Earth Exploration Satellite Service) protection&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;18.12&amp;nbsp; NR base station (BS) RF requirement evolution for FR1/FR2 and testing&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;18.13&amp;nbsp; UE Conformance - New Rel-19 NR licensed bands and extension of existing NR bands&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;18.14&amp;nbsp; Other band-related items&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;18.14.1&amp;nbsp; &amp;nbsp;7MHz Channel Bandwidth for n26 and n5&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;18.14.2&amp;nbsp; &amp;nbsp;Introduction of the NR FDD 1.4 GHz band&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;18.14.3&amp;nbsp; &amp;nbsp;Introduction of NR bands n87 and n88&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;18.14.4&amp;nbsp; &amp;nbsp;Introduction of NR band n68&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;18.14.5&amp;nbsp; &amp;nbsp;Additional NR bands for NR features in Rel-19&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;18.15&amp;nbsp; Study on spatial channel model for demodulation performance requirements for NR&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;&lt;b&gt;19&amp;nbsp; &amp;nbsp;Rel-19 LTE Radio&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;19.1&amp;nbsp; &amp;nbsp;LTE-based 5G Broadcast Phase 2&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;19.2&amp;nbsp; &amp;nbsp;Rel-19 LTE-Advanced Carrier Aggregation for x bands (1&amp;lt;=x&amp;lt;= 6) DL with y bands (y=1, 2) UL&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;19.3&amp;nbsp; &amp;nbsp;Band-related items&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;19.3.1&amp;nbsp; &amp;nbsp;New bands for LTE based 5G terrestrial broadcast for early deployments&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;19.3.2&amp;nbsp; &amp;nbsp;Introduction of LTE FDD band in 1800–1830 MHz for Canada&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;&lt;b&gt;20&amp;nbsp; &amp;nbsp;Rel-19 Mission Critical, eCall, Emergency&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;20.1&amp;nbsp; &amp;nbsp;Enhanced Mission Critical Architecture&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;20.2&amp;nbsp; &amp;nbsp;Enhanced Mission Critical Location Management&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;20.3&amp;nbsp; &amp;nbsp;Alignment of eCall over IMS with CEN&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;20.4&amp;nbsp; &amp;nbsp;UE Conformance - Alignment of eCall over IMS with CEN&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;20.5&amp;nbsp; &amp;nbsp;Multiple Location Procedure for Emergency LCS Routing&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;20.6&amp;nbsp; &amp;nbsp;Multimedia Priority Service (MPS) for Messaging services&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;20.7&amp;nbsp; &amp;nbsp;Mission Critical (MC) services for generic support on Isolated Operation for Public Safety (IOPS) mode of operation&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;20.8&amp;nbsp; &amp;nbsp;Sharing of administrative configuration between interconnected MC service systems&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;20.9&amp;nbsp; &amp;nbsp;Future Railway Mobile Communication System (FRMCS) Phase 5&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;20.10&amp;nbsp; &amp;nbsp;Mission critical security enhancements for release 19&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;20.11&amp;nbsp; &amp;nbsp;Protocol enhancements for Mission Critical Services&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;&lt;b&gt;21&amp;nbsp; &amp;nbsp;Rel-19 Network Slicing&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;21.1&amp;nbsp; &amp;nbsp;Network Controlled Network Slice Selection&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;&lt;b&gt;22&amp;nbsp; &amp;nbsp;Rel-19 Service-Based Architecture (SBA)&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;22.1&amp;nbsp; &amp;nbsp;UPF enhancement for Exposure And SBA Phase 2&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;22.2&amp;nbsp; &amp;nbsp;Automatic Certificate Management Environment (ACME) for the Service Based Architecture (SBA)&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;22.3&amp;nbsp; &amp;nbsp;Reducing Information Exposure over SBI&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;22.4&amp;nbsp; &amp;nbsp;Service Based Interface Protocol Improvements Release 19&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;&lt;b&gt;23&amp;nbsp; &amp;nbsp;Rel-19 QoS and Policy&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;23.1&amp;nbsp; &amp;nbsp;Rel-19 Enhancements of UE Policy&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;23.2&amp;nbsp; &amp;nbsp;Rel-19 Enhancements of Session Management (SM) Policy&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;23.3&amp;nbsp; &amp;nbsp;Minimize the Number of Policy Associations&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;23.4&amp;nbsp; &amp;nbsp;Spending Limits for UE Policies in Roaming scenario&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;23.5&amp;nbsp; &amp;nbsp;Enhancing Parameter Provisioning with static UE IP address and UP security policy&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;23.6&amp;nbsp; &amp;nbsp;Providing per-subscriber VLAN instructions from UDM and DN-AAA&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;23.7&amp;nbsp; &amp;nbsp;QoS monitoring enhancement&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;&lt;b&gt;24&amp;nbsp; &amp;nbsp;Rel-19 multi-access&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;24.1&amp;nbsp; &amp;nbsp;Upper layer traffic steering and switching over dual 3GPP access&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;24.2&amp;nbsp; &amp;nbsp;Multi-Access (ATSSS_Ph4)&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;24.3&amp;nbsp; &amp;nbsp;ATSSS Rule Provisioning via 3GPP access connected to EPC&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;24.4&amp;nbsp; &amp;nbsp;Local traffic routing for multi-access UE&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;&lt;b&gt;25&amp;nbsp; &amp;nbsp;Other topics&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;25.1&amp;nbsp; &amp;nbsp;Deferred 5GC-MT-LR Procedure for Periodic Location Events based NRPPa Periodic Measurement Reports&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;25.2&amp;nbsp; &amp;nbsp;Subscription control for reference time distribution in EPS&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;25.3&amp;nbsp; &amp;nbsp;Rel-19 IMS:&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;25.3.1&amp;nbsp; &amp;nbsp;PS Data Off for IMS Data Channel Service&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;25.3.2&amp;nbsp; &amp;nbsp;IMS Disaster Prevention and Restoration Enhancement&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;25.3.3&amp;nbsp; &amp;nbsp;IMS Stage-3 IETF Protocol Alignment&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;25.4&amp;nbsp; &amp;nbsp;Identifying non-3GPP Devices Connecting behind a UE or 5G-RG&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;25.5&amp;nbsp; &amp;nbsp;Integrated Sensing and Communication&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;25.6&amp;nbsp; &amp;nbsp;Rel-19 Application Data Analytics Enablement Service&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;25.7&amp;nbsp; &amp;nbsp;Interworking of Non-3GPP Digital Terrestrial Broadcast Networks with 5GS Multicast Broadcast Services&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;25.8&amp;nbsp; &amp;nbsp;Minimization of Service Interruption During Core Network Failure Phase 2&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;25.9&amp;nbsp; &amp;nbsp;Measurement Data Collection&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;25.10&amp;nbsp; Enhanced application layer support for location services&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;25.11&amp;nbsp; NF discovery and selection by target PLMN&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;25.12&amp;nbsp; MSISDN verification operation support to Nnef_UEId Service&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;25.13&amp;nbsp; Rel-19 Enhancements of Network Automation Enablers&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;25.14&amp;nbsp; Enhancement of controlling RAT utilization&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;25.15&amp;nbsp; CT Aspects for IP Domain usage&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;25.16&amp;nbsp; Indirect Network Sharing&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;25.17&amp;nbsp; Management of Network Sharing Phase 3&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;25.18&amp;nbsp; Roaming Value-Added Services&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;25.19&amp;nbsp; Monitoring of signalling traffic in 5G&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;25.20&amp;nbsp; Roaming traffic offloading via session breakout in HPLMN&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;25.21&amp;nbsp; Stage-3 5GS NAS protocol development 18&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;25.22&amp;nbsp; Stage-3 SAE Protocol Development&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;25.23&amp;nbsp; Harmonization of test case definitions for cross-RAT usability&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;25.24&amp;nbsp; Data management regarding subscriptions and reporting&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;25.25&amp;nbsp; PRU Usage Extension supported by Core Network&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;&lt;b&gt;26&amp;nbsp; &amp;nbsp;Rel-19 miscellaneous Security&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;26.1&amp;nbsp; &amp;nbsp;Security Assurance Specification for maintenance of 5G features&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;26.2&amp;nbsp; &amp;nbsp;5G Security Assurance Specification (SCAS) for the Unified Data Repository (UDR)&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;26.3&amp;nbsp; &amp;nbsp;5G Security Assurance Specification (SCAS) for the Short Message Service Function (SMSF)&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;26.4&amp;nbsp; &amp;nbsp;Addition of 256-bit security Algorithms&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;26.5&amp;nbsp; &amp;nbsp;Addition of Milenage-256 algorithm&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;26.6&amp;nbsp; &amp;nbsp;Roaming and interconnect authorization aspects in indirect communication&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;26.7&amp;nbsp; &amp;nbsp;Public key distribution and Issuer claim verification of the Access Token&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;26.8&amp;nbsp; &amp;nbsp;3GPP profiles for cryptographic algorithms and security protocols&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;26.9&amp;nbsp; &amp;nbsp;Mobility over non-3GPP access to avoid full primary authentication&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;26.10&amp;nbsp; LI Handling of Protected Services&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;26.11&amp;nbsp; Lawful Interception Rel-19&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;26.12&amp;nbsp; Lawful Interception Guidance Rel-19&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;26.13&amp;nbsp; Specification of example algorithm for alternative f5* (f5**) function&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;&lt;b&gt;27&amp;nbsp; &amp;nbsp;Rel-19 miscellaneous OAM&amp;amp;charging&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;27.1&amp;nbsp; &amp;nbsp;Charging aspects for Multi-Operator Core Network (MOCN) Network Sharing&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;27.2&amp;nbsp; &amp;nbsp;Service Based Management Architecture enhancement phase 3&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;27.3&amp;nbsp; &amp;nbsp;Management Data Analytics phase 3&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;27.4&amp;nbsp; &amp;nbsp;Intent driven management services for mobile network phase 3&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;27.5&amp;nbsp; &amp;nbsp;Management of planned configurations&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;27.6&amp;nbsp; &amp;nbsp;Management aspects of Network Digital Twins&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;27.7&amp;nbsp; &amp;nbsp;Closed Control Loop Management&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;27.8&amp;nbsp; &amp;nbsp;Data management phase 2&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;27.9&amp;nbsp; &amp;nbsp;5G performance measurements and KPIs phase 4&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;27.10&amp;nbsp; 5G Advanced NRM features phase 3&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;27.11&amp;nbsp; Subscriber and Equipment Trace and QoE collection management&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;27.12&amp;nbsp; Management of IAB nodes&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;27.13&amp;nbsp; Enhancement of Management Aspects Related of NWDAF Phase 2&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;27.14&amp;nbsp; CHF Segmentation&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #073763;&quot;&gt;27.15&amp;nbsp; Subscriber Data Migration&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;p&gt;You can download the latest version of the specs from &lt;a href=&quot;https://www.3gpp.org/ftp/Specs/archive/21_series/21.919&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Related Post&lt;/b&gt;:&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;The 3G4G Blog - &lt;a href=&quot;https://blog.3g4g.co.uk/2023/08/tutorial-quick-introduction-to-3gpp.html&quot;&gt;Tutorial: A Quick Introduction to 3GPP&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Free 6G Training: &lt;a href=&quot;https://www.free6gtraining.com/2024/04/atis-webinar-on-introduction-to-3gpp.html&quot;&gt;ATIS Webinar on &#39;Introduction to 3GPP Release 19 and 6G Planning&#39;&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2025/11/aiot-and-iot.html&quot;&gt;AIoT and A-IoT&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2025/07/the-evolution-of-3gpp-5g-network-slice.html&quot;&gt;The Evolution of 3GPP 5G Network Slice and Service Types (SSTs)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2025/04/5g-advanced-store-and-forward-s.html&quot;&gt;5G-Advanced Store and Forward (S&amp;amp;F): Enabling Resilient IoT Communications via Satellite&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2024/11/low-latency-power-saving-with-low-power.html&quot;&gt;Low Latency Power Saving with Low Power-Wake Up Signal/Receiver (LP-WUS/LP-WUR)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2023/06/3gpp-tsg-ran-and-tsg-sa-release-19.html&quot;&gt;3GPP TSG RAN and TSG SA Release-19 Workshop Summary&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2024/08/3gpp-release-18-description-and-summary.html&quot;&gt;3GPP Release 18 Description and Summary of Work Items&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2022/12/3gpp-release-17-description-and-summary.html&quot;&gt;3GPP Release 17 Description and Summary of Work Items&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2021/09/3gpp-release-16-description-and-summary.html&quot;&gt;3GPP Release 16 Description and Summary of Work Items&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;</description><link>https://blog.3g4g.co.uk/2026/04/3gpp-release-19-description-and-summary.html</link><author>noreply@blogger.com (Zahid Ghadialy)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhhqwEORydRnBRtjiuaVJ0baFCuJ9LGFO_J5ip0hDNn5ukyGvKVJFX-VXUOyioxBUq3fKm8yRICTLyUgytHxhvwvHEGkpS8iQnZWyB0RW5FfEtFvYrOgRO7o5indQFBkAbcM8dOfayqVg7-a4bpgdYPpO20L6aslU2ThRXkeuHL6zBZfDgcGKQzYZlfNrI/s72-w640-h360-c/3GPP_Release19_Priorities.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1834236085756782640.post-4609245007327853172</guid><pubDate>Thu, 26 Mar 2026 07:35:00 +0000</pubDate><atom:updated>2026-03-26T07:56:26.952+00:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">3GPP</category><category domain="http://www.blogger.com/atom/ns#">6G</category><category domain="http://www.blogger.com/atom/ns#">Ericsson</category><category domain="http://www.blogger.com/atom/ns#">Nokia Networks</category><category domain="http://www.blogger.com/atom/ns#">Standards</category><category domain="http://www.blogger.com/atom/ns#">White Papers and Reports</category><title>3GPP Study on Modernization of Specification Format and Procedures for 6G (6GSM)</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhzzGWI15k6XuydHUuhJx8sTKa_D2D0zaDoN2lUgnQSJVXSWGPFOxCHyFiibmkxuov61IBqzXlZ8_FrrBRFebO-GRh0zZneFiMRU8KBiXrZhboS78WhmAToKoljEVG5Tp3Nq3PosrQ77cAz5rFd57XOje23a3CDGRZOt7ULRtf-gjW2_VFISfd0G6lhzDw/s1920/6GSM.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1080&quot; data-original-width=&quot;1920&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhzzGWI15k6XuydHUuhJx8sTKa_D2D0zaDoN2lUgnQSJVXSWGPFOxCHyFiibmkxuov61IBqzXlZ8_FrrBRFebO-GRh0zZneFiMRU8KBiXrZhboS78WhmAToKoljEVG5Tp3Nq3PosrQ77cAz5rFd57XOje23a3CDGRZOt7ULRtf-gjW2_VFISfd0G6lhzDw/w640-h360/6GSM.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;The development of each new mobile generation is not only about new technologies and capabilities. It also requires evolution in the way standards themselves are created, maintained and consumed. As work on 6G gradually begins to take shape, the 3rd Generation Partnership Project (3GPP) has started examining whether the tools and processes used to write its specifications are still fit for purpose.&lt;/p&gt;&lt;p&gt;One of the first steps in this direction is the study titled Study on Modernization of Specification Format and Procedures for 6G (6GSM), documented in &lt;a href=&quot;https://www.3gpp.org/ftp/Specs/archive/21_series/21.802&quot; target=&quot;_blank&quot;&gt;TR 21.802&lt;/a&gt;. The study looks at how the current approach to specification development works, the limitations that are becoming more visible as specifications grow larger and more complex, and the possible directions for modernising the process as the industry prepares for the 6G era.&lt;/p&gt;&lt;p&gt;3GPP specifications form the backbone of the mobile industry. They define how networks, devices and services interoperate across the globe. However, the way these specifications are produced has largely remained unchanged for many years. Today, most specifications are created and maintained using document based workflows centred around Microsoft Word and DOCX files. Delegates submit Change Requests that modify the text of these documents, and editors manually merge the approved changes into updated specification versions. This approach has served the industry well for decades because it is familiar, widely supported and easy for participants to understand.&lt;/p&gt;&lt;p&gt;The study recognises that the current workflow has several strengths. The document format provides a consistent structure across thousands of specifications. Contributors can edit content directly using familiar WYSIWYG tools, review tracked changes, include diagrams and tables, and collaborate during meetings by editing documents in real time on shared screens. These capabilities have helped large groups of experts work together efficiently during standardisation meetings.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEglGAlrJNyreQ4wnTLiZe25jmeONccM44lKUohtN-GQyHokIBCD2dRLe8x6cl_7kF_yNDS7G1-l-2HX5MdwDd78nYeY3UWE9mCo5wDSlcO_g1gn6eNBE_TzsSc6V8rmAz7MsPYa7Pj2fL9-BQDjtqyW3BiZ_0x9O32uzVJzBXpN3l-GI6tlvmRoVk-MWPc/s1920/3GPP_Specifications_Modernization.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1080&quot; data-original-width=&quot;1920&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEglGAlrJNyreQ4wnTLiZe25jmeONccM44lKUohtN-GQyHokIBCD2dRLe8x6cl_7kF_yNDS7G1-l-2HX5MdwDd78nYeY3UWE9mCo5wDSlcO_g1gn6eNBE_TzsSc6V8rmAz7MsPYa7Pj2fL9-BQDjtqyW3BiZ_0x9O32uzVJzBXpN3l-GI6tlvmRoVk-MWPc/w640-h360/3GPP_Specifications_Modernization.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;At the same time, as specifications grow larger and more complex, the limitations of the current approach are becoming more visible. One of the most obvious challenges is the heavy reliance on manual processes. Change Requests must be merged into specifications by editors, which can introduce delays before updated versions are published. When multiple Change Requests modify the same sections of a document, identifying conflicts or inconsistencies can be difficult.&lt;/p&gt;&lt;p&gt;Scale is another factor. Many technical specifications now run into hundreds or even thousands of pages. Opening, searching or editing such large DOCX files can become slow and occasionally unstable. Large tables, embedded diagrams and complex formatting further increase file sizes and processing overhead.&lt;/p&gt;&lt;p&gt;Understanding how a feature evolves across specification versions can also be difficult for readers and implementers. Engineers often need to trace how a particular capability has changed between releases, but linking the final specification text back to the relevant Change Requests or understanding the context behind changes is not always straightforward.&lt;/p&gt;&lt;p&gt;The document format itself also presents challenges for automated processing. Extracting structured information from DOCX files requires significant preprocessing because textual content is mixed with binary elements such as images and embedded objects. This makes it harder for tools to analyse specifications or automate parts of the development workflow.&lt;/p&gt;&lt;p&gt;Navigation across specifications is another area where improvements could help. Many features are defined across multiple technical specifications produced by different working groups. Following references between documents or understanding how procedures interact across specifications can take time and effort, especially for engineers who are new to the standards.&lt;/p&gt;&lt;p&gt;To address these challenges, the study explores a number of alternative specification formats that could be considered for future work. Options such as OpenDocument, AsciiDoc, Markdown and LaTeX are discussed, along with more structured or restricted DOCX based approaches. Some proposals also consider hybrid models where different formats could coexist while maintaining a single authoritative source.&lt;/p&gt;&lt;p&gt;Text based markup formats such as Markdown or AsciiDoc are particularly interesting because they separate content from presentation. This structure can make version control and automated processing easier. These formats are widely used in software development environments and integrate well with modern collaboration tools that track changes and manage contributions from multiple participants.&lt;/p&gt;&lt;p&gt;LaTeX is another potential option, particularly for documents that require complex technical formatting or mathematical expressions. Meanwhile, restricted DOCX approaches attempt to preserve compatibility with existing workflows while enforcing stricter formatting rules to reduce complexity and improve consistency.&lt;/p&gt;&lt;p&gt;Beyond the document format itself, the study also looks at broader improvements to the way specifications are developed and maintained. One important idea is the use of modern version control systems such as Git. These systems are widely used in software development and allow contributors to track changes in detail, manage parallel development branches and merge updates in a more controlled manner. Applying similar workflows to standards development could improve traceability and help identify conflicts earlier.&lt;/p&gt;&lt;p&gt;The study also highlights the potential for automated validation tools that could check Change Requests for formatting errors, missing references or structural inconsistencies before they are submitted. Such tools could reduce the editorial workload while improving the overall quality and consistency of specifications.&lt;/p&gt;&lt;p&gt;Another possible direction is the use of machine readable formats for structured elements within specifications. Interfaces, protocol definitions or data models could be stored separately in structured files and then referenced or generated automatically within the main specification. This approach could reduce duplication and make it easier for implementers to reuse information directly in development environments.&lt;/p&gt;&lt;p&gt;The modernisation study does not recommend a single solution at this stage. Instead, it provides a detailed analysis of the current situation and explores possible directions for future work. Any transition will need to balance the benefits of new tools and formats with the practical realities of the existing ecosystem. The 3GPP community relies on a large set of established workflows, tools and expertise, and maintaining accessibility for all participants will be important.&lt;/p&gt;&lt;p&gt;As the industry moves towards 6G, the scale and complexity of specifications will continue to grow. Ensuring that the processes used to create and manage these specifications evolve alongside the technologies themselves will be essential. In that sense, modernising specification formats and procedures may become an important step in preparing the standards ecosystem for the next generation of mobile innovation.&lt;/p&gt;&lt;p&gt;If you want to learn more about this, check out:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;6G Specification Modernization discussions from Nokia &amp;amp; Ericsson &lt;a href=&quot;https://www.3gpp.org/ftp/tsg_ran/TSG_RAN/Tool_Automation_6G/&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;.&lt;/li&gt;&lt;li&gt;Ongoing 6GSM Workshop discussions &lt;a href=&quot;https://www.3gpp.org/ftp/workshop/FS_6GSpecs&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;.&lt;/li&gt;&lt;li&gt;3GPP TR 21.802: Study on modernization of specification format and procedures for 6G &lt;a href=&quot;https://www.3gpp.org/ftp/Specs/archive/21_series/21.802&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;Related Posts&lt;/b&gt;:&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;The 3G4G Blog - &lt;a href=&quot;https://blog.3g4g.co.uk/2023/08/tutorial-quick-introduction-to-3gpp.html&quot;&gt;Tutorial: A Quick Introduction to 3GPP&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2024/08/3gpp-release-18-description-and-summary.html&quot;&gt;3GPP Release 18 Description and Summary of Work Items&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;</description><link>https://blog.3g4g.co.uk/2026/03/3gpp-study-on-modernization-of.html</link><author>noreply@blogger.com (Zahid Ghadialy)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhzzGWI15k6XuydHUuhJx8sTKa_D2D0zaDoN2lUgnQSJVXSWGPFOxCHyFiibmkxuov61IBqzXlZ8_FrrBRFebO-GRh0zZneFiMRU8KBiXrZhboS78WhmAToKoljEVG5Tp3Nq3PosrQ77cAz5rFd57XOje23a3CDGRZOt7ULRtf-gjW2_VFISfd0G6lhzDw/s72-w640-h360-c/6GSM.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1834236085756782640.post-6460067554336877480</guid><pubDate>Tue, 03 Mar 2026 07:35:00 +0000</pubDate><atom:updated>2026-03-03T17:31:32.885+00:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">ICS/OT</category><category domain="http://www.blogger.com/atom/ns#">Industry 4.0</category><category domain="http://www.blogger.com/atom/ns#">Network Infrastructure</category><category domain="http://www.blogger.com/atom/ns#">Security</category><category domain="http://www.blogger.com/atom/ns#">Training</category><category domain="http://www.blogger.com/atom/ns#">Utilities</category><category domain="http://www.blogger.com/atom/ns#">Videos</category><title>Strengthening Critical Infrastructure Security with OSINT</title><description>&lt;p&gt;Cybersecurity conversations in telecoms often focus on IT systems, cloud platforms and enterprise networks. Yet beyond the data centres and mobile cores lies another domain that is arguably even more critical to society. Industrial Control Systems (ICS) and Operational Technology (OT) environments underpin the power plants, water treatment facilities, railways, petrochemical sites and manufacturing plants that keep daily life running. These environments are increasingly in the crosshairs of cyber attackers.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgURrTf4PuiAIV_CbG3wCVwoJxw8UOyFZihDRyhmAqolSXH8AH9iV-mJHLtUi-pZ75zvZ6o4g0-nklqA943D4UGXwcBzgdzLIKJNo6SrAO3qYGXhlgsHvhdxX2KgmLPRHdyuyWalJU7jgOWwuSMr3rgLHflLZloiKB5gqmY9jpRlEGryYh5Lp6sRls38B8/s1920/OT_ExposedOnTheInternet.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1080&quot; data-original-width=&quot;1920&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgURrTf4PuiAIV_CbG3wCVwoJxw8UOyFZihDRyhmAqolSXH8AH9iV-mJHLtUi-pZ75zvZ6o4g0-nklqA943D4UGXwcBzgdzLIKJNo6SrAO3qYGXhlgsHvhdxX2KgmLPRHdyuyWalJU7jgOWwuSMr3rgLHflLZloiKB5gqmY9jpRlEGryYh5Lp6sRls38B8/w640-h360/OT_ExposedOnTheInternet.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;A comprehensive &lt;a href=&quot;https://www.youtube.com/watch?v=e7GTwmCX_Ws&amp;amp;list=PLOSJSv0hbPZBXT4kuRv_e8BP0TyOGc_W5&quot; target=&quot;_blank&quot;&gt;YouTube course&lt;/a&gt; titled OSINT for ICS and OT brings much needed attention to this area. Created by Mike Holcomb, the 10 plus hour course explores how Open Source Intelligence (OSINT) can be used to better understand, assess and protect ICS and OT environments. For anyone working in telecoms infrastructure, utilities, transport or industrial sectors, this is highly relevant material.&lt;/p&gt;&lt;p&gt;Mike focuses on the practical reality that there are still relatively few accessible and high quality resources dedicated to OT and ICS cybersecurity. While IT security has matured with abundant training paths, certifications and community support, the world of control systems security remains comparatively underserved. That gap is particularly concerning given the importance of critical infrastructure to national resilience and economic stability.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;blockquote class=&quot;twitter-tweet&quot; data-conversation=&quot;none&quot;&gt;&lt;p dir=&quot;ltr&quot; lang=&quot;en&quot;&gt;Nice picture explaining the convergence of IT &amp;amp; OT - &quot;While IT focuses on data and business processes, OT is dedicated to the control and monitoring of physical operations... Convergence of IT/OT generally means that the OT network is now accessible from the outside world via...&quot; &lt;a href=&quot;https://t.co/i9RrWrr1hb&quot;&gt;pic.twitter.com/i9RrWrr1hb&lt;/a&gt;&lt;/p&gt;— Private Networks (@PrivNetTech) &lt;a href=&quot;https://twitter.com/PrivNetTech/status/1919457883051196743?ref_src=twsrc%5Etfw&quot;&gt;May 5, 2025&lt;/a&gt;&lt;/blockquote&gt; &lt;script async=&quot;&quot; charset=&quot;utf-8&quot; src=&quot;https://platform.twitter.com/widgets.js&quot;&gt;&lt;/script&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;In his channel overview, Mike explains that his work is aimed at a broad audience. It includes IT cybersecurity professionals looking to pivot into OT security, engineers already working in industrial environments who want to strengthen their defensive posture, and owners or operators who are building or refining a cybersecurity programme for their facilities. This inclusive approach reflects the multidisciplinary nature of OT security, where engineering, networking and cybersecurity disciplines intersect.&lt;/p&gt;&lt;p&gt;The turning point for many in this field was the discovery of Stuxnet, the first widely known cyber weapon designed to disrupt industrial processes. The malware specifically targeted centrifuges in a uranium enrichment facility, manipulating physical processes while masking its actions from operators. For Mike, learning about Stuxnet sparked a deeper curiosity about how control systems function inside power plants and other facilities, and how they can be secured. That same question remains highly relevant today.&lt;/p&gt;&lt;p&gt;For readers of &lt;a href=&quot;https://blog.3g4g.co.uk/&quot; target=&quot;_blank&quot;&gt;The 3G4G Blog&lt;/a&gt;, there is a natural connection. As telecom networks evolve towards 5G, private networks and future 6G systems, connectivity is extending deeper into industrial domains. Smart grids, connected factories and digitalised transport systems rely on robust communications as well as secure control environments. The boundary between IT and OT continues to blur. Understanding how adversaries might gather intelligence about exposed assets, misconfigurations or vulnerable systems using open sources is therefore a critical skill.&lt;/p&gt;&lt;p&gt;The OSINT for ICS and OT course aims to demystify that process. It looks at how publicly available information can reveal insights about industrial environments and how defenders can use the same techniques proactively. Rather than waiting for an incident, organisations can identify potential weaknesses and exposure before an attacker does. This proactive mindset aligns closely with modern security best practice across both telecom and industrial sectors.&lt;/p&gt;&lt;p&gt;Another important aspect is accessibility. The course is freely available on YouTube, lowering the barrier to entry for those who may be curious about OT security but unsure where to start. In a domain where specialist training can be expensive and difficult to find, open educational content plays a valuable role in building community knowledge and capability.&lt;/p&gt;&lt;p&gt;Critical infrastructure protection is not a niche concern. It affects the electricity that powers base stations, the water that cools data centres and the transport systems that support supply chains. As cyber threats continue to evolve, the need for professionals who understand both networking and industrial control environments will only grow.&lt;/p&gt;&lt;p&gt;For those interested in expanding their horizons beyond traditional telecom security and into the protection of the systems that underpin modern society, this course is well worth exploring. It is encouraging to see experienced practitioners sharing knowledge openly and helping to strengthen resilience across critical infrastructure sectors.&lt;/p&gt;&lt;p&gt;&lt;iframe allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;315&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; src=&quot;https://www.youtube.com/embed/videoseries?si=KR378aeh0ebgT9E_&amp;amp;list=PLOSJSv0hbPZBXT4kuRv_e8BP0TyOGc_W5&quot; title=&quot;YouTube video player&quot; width=&quot;560&quot;&gt;&lt;/iframe&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;Related Posts&lt;/b&gt;:&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2026/01/telecom-security-realities-from-2025.html&quot;&gt;Telecom Security Realities from 2025 and Lessons for 2026&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Private Networks Technology Blog - &lt;a href=&quot;https://blog.privatenetworks.technology/2025/08/it-and-ot-convergence-opportunities-and.html&quot;&gt;IT and OT Convergence: Opportunities and Security Risks for Private Networks&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2025/05/3gpp-release-18-signal-level-enhanced.html&quot;&gt;3GPP Release 18 Signal level Enhanced Network Selection (SENSE) for Smarter Network Selection in Stationary IoT&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Private Networks Technology Blog: &lt;a href=&quot;https://blog.privatenetworks.technology/2025/05/understanding-realities-of-ot.html&quot;&gt;Understanding the Realities of OT Cybersecurity&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2022/10/key-enablers-for-mass-iot-adoption.html&quot;&gt;Key enablers for mass IoT adoption&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;</description><link>https://blog.3g4g.co.uk/2026/03/strengthening-critical-infrastructure.html</link><author>noreply@blogger.com (Zahid Ghadialy)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgURrTf4PuiAIV_CbG3wCVwoJxw8UOyFZihDRyhmAqolSXH8AH9iV-mJHLtUi-pZ75zvZ6o4g0-nklqA943D4UGXwcBzgdzLIKJNo6SrAO3qYGXhlgsHvhdxX2KgmLPRHdyuyWalJU7jgOWwuSMr3rgLHflLZloiKB5gqmY9jpRlEGryYh5Lp6sRls38B8/s72-w640-h360-c/OT_ExposedOnTheInternet.jpg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1834236085756782640.post-3797797842033216354</guid><pubDate>Tue, 03 Feb 2026 07:35:00 +0000</pubDate><atom:updated>2026-02-03T14:39:34.772+00:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">AI</category><category domain="http://www.blogger.com/atom/ns#">Artificial Intelligence</category><category domain="http://www.blogger.com/atom/ns#">IBM</category><category domain="http://www.blogger.com/atom/ns#">Tutorials</category><category domain="http://www.blogger.com/atom/ns#">Videos</category><title>Seven AI Concepts Shaping Network Intelligence</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZXj0QCIj0jQvF_mjDPHD0M7F2kEq22Qfow5TckZ_hzcEC619UVsYJ1ZSmLjnqmaBvZ5QAD0ZREJQTm3Y8aUuuuxrxgVUp4AhmydIC2XXshFHa2GZbkuTPGxs72z6Bci6SCnMWgUeDfF8EAvy00Xd99Ve_B7-8M3-mu12deBy79LaYszl1hicBpXG3iVQ/s1920/IBMtechnology_7AIterms_2025.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1080&quot; data-original-width=&quot;1920&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZXj0QCIj0jQvF_mjDPHD0M7F2kEq22Qfow5TckZ_hzcEC619UVsYJ1ZSmLjnqmaBvZ5QAD0ZREJQTm3Y8aUuuuxrxgVUp4AhmydIC2XXshFHa2GZbkuTPGxs72z6Bci6SCnMWgUeDfF8EAvy00Xd99Ve_B7-8M3-mu12deBy79LaYszl1hicBpXG3iVQ/w640-h360/IBMtechnology_7AIterms_2025.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;AI has become so deeply embedded in our everyday working lives that it is no longer limited to data science teams or research labs. In telecoms, AI now plays a central role in network planning, optimisation, assurance and automation. As a result, the industry is rapidly absorbing a growing set of AI-related terms and concepts, many of which are directly relevant to how networks are evolving towards higher levels of autonomy.&lt;/p&gt;&lt;p&gt;I recently came across the video embedded below, which provides clear explanations of seven AI terms that are becoming increasingly important in the context of network intelligence and autonomous networks. Some of these concepts are already being applied in operational networks today, while others point clearly towards the direction of travel for AI-native 5G Advanced and 6G systems.&lt;/p&gt;&lt;p&gt;The video begins with &lt;b&gt;Agentic AI&lt;/b&gt;, a concept that aligns closely with the telecom industry’s vision for autonomous networks as defined in 3GPP. Unlike traditional AI models that respond to a single prompt, AI agents can perceive their environment, reason about next steps, take action and observe the outcome in a continuous loop. In practical terms, this maps well to closed-loop automation use cases such as self-healing, energy optimisation, dynamic resource allocation and intent-driven network management.&lt;/p&gt;&lt;p&gt;Closely related are &lt;b&gt;Large Reasoning Models&lt;/b&gt;, which are designed to work through problems step by step rather than producing an immediate response. This capability is particularly relevant for telecom networks, where decisions often span multiple domains, layers and vendors. As AI systems take on greater responsibility for operational decisions, reasoning-based models become essential for safe and explainable automation.&lt;/p&gt;&lt;p&gt;The video then moves to more foundational enablers, starting with &lt;b&gt;Vector Databases&lt;/b&gt;. Telecom networks generate vast volumes of unstructured data, including logs, alarms, performance metrics, configuration data and documentation. Vector databases allow this information to be searched and correlated based on semantic meaning rather than simple keywords, enabling more context-aware and intelligent AI systems.&lt;/p&gt;&lt;p&gt;This naturally leads to &lt;b&gt;Retrieval-Augmented Generation (RAG)&lt;/b&gt;, which is already gaining traction in telecom operations. By combining large language models with operator-specific data sources such as standards, network documentation or operational procedures, RAG helps ground AI outputs in trusted information. This is particularly important in network operations, where accuracy and reliability are critical.&lt;/p&gt;&lt;p&gt;Another important concept discussed is the &lt;b&gt;Model Context Protocol (MCP)&lt;/b&gt;, which addresses how AI models interact with external tools and systems. For telecom operators, standardised mechanisms for AI access to network management systems, data platforms and orchestration tools could significantly simplify integration and accelerate the deployment of AI-driven automation across the network lifecycle.&lt;/p&gt;&lt;p&gt;The video also touches on &lt;b&gt;Mixture of Experts (MoE)&lt;/b&gt; models, which provide a more efficient way to scale AI by activating only the parts of a model needed for a specific task. This approach is especially relevant for telecom use cases where compute efficiency, latency and energy consumption are key constraints, particularly as AI capabilities move closer to the edge of the network.&lt;/p&gt;&lt;p&gt;Finally, the video briefly discusses &lt;b&gt;Artificial Superintelligence (ASI)&lt;/b&gt;. While ASI remains theoretical, it is often referenced in long-term discussions around AI evolution. For the telecom industry, it serves as a reminder of the rapid pace of change and the importance of governance, trust and control as networks become increasingly autonomous and software-driven.&lt;/p&gt;&lt;p&gt;Overall, this video offers a useful technical refresher on AI concepts that are already shaping the development of network intelligence, autonomous operations and AI-native architectures. For anyone working on 5G Advanced, autonomous networks or early 6G thinking, these are terms that are quickly becoming part of the industry’s everyday vocabulary.&lt;/p&gt;&lt;p&gt;&lt;iframe allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;315&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; src=&quot;https://www.youtube.com/embed/VSFuqMh4hus?si=r2YXaTzPgYaoAH6N&quot; title=&quot;YouTube video player&quot; width=&quot;560&quot;&gt;&lt;/iframe&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;Related Posts and Articles&lt;/b&gt;:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Cambridge Wireless - &lt;a href=&quot;https://www.cambridgewireless.co.uk/resource/agentic-ai-security-navigating-trust-autonomy-and-resilience.html&quot;&gt;Agentic AI Security: Navigating Trust, Autonomy and Resilience&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog - &lt;a href=&quot;https://blog.3g4g.co.uk/2025/03/aiml-in-3gpp-progress-challenges-and.html&quot;&gt;AI/ML in 3GPP: Progress, Challenges, and the Road to 6G&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Operator Watch Blog: &lt;a href=&quot;https://www.operatorwatch.com/2026/01/automation-and-data-driven-network.html&quot;&gt;Automation and Data Driven Network Optimization in Swisscom’s Mobile Strategy&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Operator Watch Blog: &lt;a href=&quot;https://www.operatorwatch.com/2025/12/telefonicas-journey-towards-end-to-end.html&quot;&gt;Telefonica’s Journey Towards End-to-End Autonomous Networks&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Operator Watch Blog: &lt;a href=&quot;https://www.operatorwatch.com/2025/12/the-power-of-ai-in-ntt-docomos-5g.html&quot;&gt;The Power of AI in NTT Docomo’s 5G Journey&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Operator Watch Blog: &lt;a href=&quot;https://www.operatorwatch.com/2025/11/building-and-scaling-ai-cloud-native.html&quot;&gt;Building and Scaling AI the Cloud Native Way at Singtel&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Operator Watch Blog: &lt;a href=&quot;https://www.operatorwatch.com/2025/06/how-ai-is-reshaping-network-operations.html&quot;&gt;How AI Is Reshaping Network Operations at Deutsche Telekom&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Free 6G Training: &lt;a href=&quot;https://www.free6gtraining.com/2025/12/agentic-ai-and-path-to-hyper.html&quot;&gt;Agentic AI and the Path to Hyper-Personalised 6G Networks&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Free 6G Training - &lt;a href=&quot;https://www.free6gtraining.com/2025/12/pioneering-6g-with-ai-reflections-on.html&quot;&gt;Pioneering 6G with AI: Reflections on NVIDIA’s Keynote at the Brooklyn 6G Summit 2025&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Free 6G Training - &lt;a href=&quot;https://www.free6gtraining.com/2025/11/ai-for-wireless-evaluating-neural.html&quot;&gt;AI for Wireless: Evaluating Neural Receivers with Test and Measurement and Digital Twins&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2025/11/aiot-and-iot.html&quot;&gt;AIoT and A-IoT&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;</description><link>https://blog.3g4g.co.uk/2026/02/seven-ai-concepts-shaping-network.html</link><author>noreply@blogger.com (Zahid Ghadialy)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZXj0QCIj0jQvF_mjDPHD0M7F2kEq22Qfow5TckZ_hzcEC619UVsYJ1ZSmLjnqmaBvZ5QAD0ZREJQTm3Y8aUuuuxrxgVUp4AhmydIC2XXshFHa2GZbkuTPGxs72z6Bci6SCnMWgUeDfF8EAvy00Xd99Ve_B7-8M3-mu12deBy79LaYszl1hicBpXG3iVQ/s72-w640-h360-c/IBMtechnology_7AIterms_2025.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1834236085756782640.post-6991933394568605554</guid><pubDate>Tue, 20 Jan 2026 07:35:00 +0000</pubDate><atom:updated>2026-01-20T08:16:57.621+00:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">3G</category><category domain="http://www.blogger.com/atom/ns#">5G</category><category domain="http://www.blogger.com/atom/ns#">AI</category><category domain="http://www.blogger.com/atom/ns#">Artificial Intelligence</category><category domain="http://www.blogger.com/atom/ns#">GSM</category><category domain="http://www.blogger.com/atom/ns#">LTE</category><category domain="http://www.blogger.com/atom/ns#">Network Automation</category><category domain="http://www.blogger.com/atom/ns#">Satellite Communications</category><category domain="http://www.blogger.com/atom/ns#">Security</category><category domain="http://www.blogger.com/atom/ns#">SecurityGen</category><category domain="http://www.blogger.com/atom/ns#">SIM</category><category domain="http://www.blogger.com/atom/ns#">Skills</category><category domain="http://www.blogger.com/atom/ns#">SS7</category><category domain="http://www.blogger.com/atom/ns#">Videos</category><category domain="http://www.blogger.com/atom/ns#">VoLTE</category><category domain="http://www.blogger.com/atom/ns#">Webinar</category><title>Telecom Security Realities from 2025 and Lessons for 2026</title><description>&lt;p&gt;Telecom security rarely stands still. Each year brings new technologies, new attack paths, and new operational realities. Yet 2025 was not defined by dramatic new exploits or spectacular network failures. Instead, it became a year that highlighted how persistent, patient and methodical modern telecom attackers have become.&lt;/p&gt;&lt;p&gt;The recent SecurityGen Year-End Telecom Security Webinar offered a detailed look back at what the industry experienced during 2025. The session pulled together research findings, real world incidents and practical lessons from across multiple domains, including legacy signalling, eSIM ecosystems, VoLTE vulnerabilities and the emerging world of satellite-based mobile connectivity.&lt;/p&gt;&lt;p&gt;For anyone working in mobile networks, the message was clear. The threats are evolving, but many of the core problems remain stubbornly familiar.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLHsGDJzHDar4jng4tVnyMKVgGHWTtKB6FaOz86jNbIY863rFOuNsh3OoCcLlqpwyJxKAi2ZefUmrXtKB8qpO0HlOBYk9pFLeHF3cKJHgI-6sZmEUwlx1lrAy48EUTTRmrZolMhkQ-lKZIfil41ITuNIS2epey3htRoV2J8P6fGNH0zbXv5nBGl2tHgN0/s1920/SecurityGen_TelecomSecurityRealitiesFrom2025_1.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1080&quot; data-original-width=&quot;1920&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLHsGDJzHDar4jng4tVnyMKVgGHWTtKB6FaOz86jNbIY863rFOuNsh3OoCcLlqpwyJxKAi2ZefUmrXtKB8qpO0HlOBYk9pFLeHF3cKJHgI-6sZmEUwlx1lrAy48EUTTRmrZolMhkQ-lKZIfil41ITuNIS2epey3htRoV2J8P6fGNH0zbXv5nBGl2tHgN0/w640-h360/SecurityGen_TelecomSecurityRealitiesFrom2025_1.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;b&gt;A Year of Stealth Rather Than Spectacle&lt;/b&gt;&lt;/p&gt;&lt;p&gt;One of the most important themes from the webinar was that 2025 did not bring a wave of highly visible disruptive telecom attacks. Instead, it was characterised by quiet, low profile intrusions that often went undetected for long periods.&lt;/p&gt;&lt;p&gt;Operators around the world reported that attackers increasingly favoured living-off-the-land techniques. Rather than deploying noisy malware, intruders looked for ways to gain legitimate access to core systems and remain hidden. Lawful interception platforms, subscriber databases such as HLR and HSS, and internal management platforms were all targeted.&lt;/p&gt;&lt;p&gt;The primary objective in many cases was intelligence collection. Attackers were interested in call data, subscriber information and network topology rather than immediate disruption. This shift in motivation makes detection far more difficult, as there are often few obvious signs of compromise.&lt;/p&gt;&lt;p&gt;At the same time, automation has become a defining feature on both sides of the security battle. Operators are investing heavily in AI and machine learning to identify abnormal behaviour. Attackers are doing exactly the same, using automation to scale phishing campaigns and to accelerate exploit development.&lt;/p&gt;&lt;p&gt;Despite all this technology, basic security discipline continues to be a major challenge. A significant proportion of incidents still originate from human error, poor operational practices or simple failure to apply patches. The industry continues to invest billions in cybersecurity, but much of that effort is consumed by reporting and compliance activities rather than direct threat mitigation.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhbHUIGDIMnE9e0SB9u6ugrnrxnPCETixb33Uw-Oxa5nwWBXQE1Ty98kconnJFiNsXWDBVLqwlAp67X3VYq8EBJzwsyGd8z33itplrbnmMHZm1ieRWYPOhAsW7muNAogNTE9DN5G7trOqrtzTfMFHWQjTmUSjJ41NB4XEaND4MlACd1HHorvm7edc46JOs/s1920/SecurityGen_TelecomSecurityRealitiesFrom2025_2.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1080&quot; data-original-width=&quot;1920&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhbHUIGDIMnE9e0SB9u6ugrnrxnPCETixb33Uw-Oxa5nwWBXQE1Ty98kconnJFiNsXWDBVLqwlAp67X3VYq8EBJzwsyGd8z33itplrbnmMHZm1ieRWYPOhAsW7muNAogNTE9DN5G7trOqrtzTfMFHWQjTmUSjJ41NB4XEaND4MlACd1HHorvm7edc46JOs/w640-h360/SecurityGen_TelecomSecurityRealitiesFrom2025_2.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;b&gt;eSIM Security Comes into Sharp Focus&lt;/b&gt;&lt;/p&gt;&lt;p&gt;The transition from physical SIM cards to eSIM and remote provisioning is one of the most significant structural changes in the mobile industry. It offers clear benefits in terms of flexibility and user experience. However, the webinar highlighted that it also introduces entirely new security concerns.&lt;/p&gt;&lt;p&gt;Traditional SIM security models relied heavily on physical control. Fraudsters needed access to large numbers of real SIM cards to operate at scale. With eSIM, many of those physical constraints disappear. Remote provisioning expands the number of parties involved in the connectivity chain, including resellers and intermediaries who may not always operate under strict regulatory oversight.&lt;/p&gt;&lt;p&gt;During 2025 several major SIM farm operations were dismantled by law enforcement. These infrastructures contained tens of thousands of active SIM cards and were used for large scale fraud, smishing campaigns and automated account creation. While such operations existed long before eSIM, the technology has the potential to make them even easier to deploy and manage.&lt;/p&gt;&lt;p&gt;Research discussed in the session pointed to additional concerns. Analysis of travel eSIM services revealed issues such as cross-border routing of management traffic, excessive levels of control granted to resellers, and lifecycle management weaknesses that could potentially be abused by attackers. In some cases, resellers were found to have capabilities similar to full mobile operators, but without equivalent governance or transparency.&lt;/p&gt;&lt;p&gt;The conclusion was not that eSIM is inherently insecure. The technology itself uses strong encryption and robust mechanisms. The problem lies in the wider ecosystem of trust boundaries, partners and processes that surround it. Securing eSIM therefore requires cooperation between operators, vendors, regulators and service providers.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjjgruVaRVzL4K25MtWDRBzXblmfrsdAKP1TtS62JjhevVr9ekObDsoDxopghXLoFBqoxEeji-FI88VsFN9isaVN4xyMLr8Rc1zTFZSiuB0OADqD5xp50PdTLx7b3DnVW9ZXx5cRF8CQCog44TwMSMvsqnIlWopVbfVfsCGSY6STlBqROevs9iGhhHXONw/s1920/SecurityGen_TelecomSecurityRealitiesFrom2025_3.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1080&quot; data-original-width=&quot;1920&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjjgruVaRVzL4K25MtWDRBzXblmfrsdAKP1TtS62JjhevVr9ekObDsoDxopghXLoFBqoxEeji-FI88VsFN9isaVN4xyMLr8Rc1zTFZSiuB0OADqD5xp50PdTLx7b3DnVW9ZXx5cRF8CQCog44TwMSMvsqnIlWopVbfVfsCGSY6STlBqROevs9iGhhHXONw/w640-h360/SecurityGen_TelecomSecurityRealitiesFrom2025_3.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;b&gt;SS7 Remains a Persistent Weak Point&lt;/b&gt;&lt;/p&gt;&lt;p&gt;Few topics in telecom security generate as much ongoing concern as SS7. Despite being a technology from a previous era, it remains deeply embedded in global mobile infrastructure. The webinar dedicated significant attention to why SS7 continues to be exploited in 2025 and why it is likely to remain a problem for many years to come.&lt;/p&gt;&lt;p&gt;Throughout the year, media reports and research papers continued to demonstrate practical abuses of SS7 signalling. Attackers probed networks, attempted to bypass signalling firewalls and looked for new ways to manipulate protocol behaviour. Techniques such as parameter manipulation and protocol parsing tricks were highlighted as methods that can sometimes evade existing protections.&lt;/p&gt;&lt;p&gt;One particularly interesting demonstration showed how SS7 messages could be used as a covert channel for data exfiltration. By embedding information inside otherwise legitimate signalling transactions, attackers can potentially move data across networks without triggering traditional security alarms.&lt;/p&gt;&lt;p&gt;Perhaps the most striking point raised was how little progress has been made in eliminating SS7 dependencies. Analysis of global network deployments showed that only a handful of countries operate mobile networks entirely without SS7. Everywhere else, the protocol remains a foundational element of roaming and interconnect.&lt;/p&gt;&lt;p&gt;As a result, even operators that have invested heavily in 4G and 5G security can still be undermined by weaknesses in this legacy layer. The uncomfortable reality is that SS7 vulnerabilities will continue to be exploited well into 2026 and beyond.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHFDXZmEDTE9OZjNXMolzCh47tW8vpyuyZXmUREt9p57JayNPkQdTBqY9B3_06Suk7u-FZQGjTXf_IsQ5D0KgpROe7pXMyMWXDkko6uvFU2bdPAp0aVl6OJLZyv4UF8aF_fWgkb4thoyeO78J-mr3TP5vhyphenhyphengeRj0y39mOtDeA_DBKhPqyGHuRMAoYI1Lo/s1920/SecurityGen_TelecomSecurityRealitiesFrom2025_4.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1080&quot; data-original-width=&quot;1920&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHFDXZmEDTE9OZjNXMolzCh47tW8vpyuyZXmUREt9p57JayNPkQdTBqY9B3_06Suk7u-FZQGjTXf_IsQ5D0KgpROe7pXMyMWXDkko6uvFU2bdPAp0aVl6OJLZyv4UF8aF_fWgkb4thoyeO78J-mr3TP5vhyphenhyphengeRj0y39mOtDeA_DBKhPqyGHuRMAoYI1Lo/w640-h360/SecurityGen_TelecomSecurityRealitiesFrom2025_4.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;b&gt;VoLTE and Modern Core Network Risks&lt;/b&gt;&lt;/p&gt;&lt;p&gt;While legacy protocols remain a problem, modern technologies are not immune. VoLTE infrastructure in particular was identified as an increasingly attractive target.&lt;/p&gt;&lt;p&gt;VoLTE relies on complex interactions between signalling systems, IP multimedia subsystems and subscriber databases. Weaknesses in configuration or interconnection can open the door to call interception, fraud or denial of service. Several real world incidents during 2025 demonstrated that attackers are actively exploring these paths.&lt;/p&gt;&lt;p&gt;The move toward fully virtualised and cloud-native mobile cores also introduces new operational challenges. Telecom networks now resemble large IT environments, complete with the same risks around misconfiguration, insecure APIs and exposed management interfaces.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEisq6e6u2F4Xk02STqVIIcxDLPvr3wie_Biavh0-00a7SZQidPQG2CqNLU1cPhOun1rMrw0VhhbkG64z_t7zGVlDXjN0X0OHaUCexy_0m5KzLbGAAVziQbU6dGoDAcLVqC74R-Egm3L07Z8QXfe-JTlo1xpjXCZ6rr0nP9oH0oKk4IRntxxAY511-XYesQ/s1920/SecurityGen_TelecomSecurityRealitiesFrom2025_5.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1080&quot; data-original-width=&quot;1920&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEisq6e6u2F4Xk02STqVIIcxDLPvr3wie_Biavh0-00a7SZQidPQG2CqNLU1cPhOun1rMrw0VhhbkG64z_t7zGVlDXjN0X0OHaUCexy_0m5KzLbGAAVziQbU6dGoDAcLVqC74R-Egm3L07Z8QXfe-JTlo1xpjXCZ6rr0nP9oH0oKk4IRntxxAY511-XYesQ/w640-h360/SecurityGen_TelecomSecurityRealitiesFrom2025_5.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;b&gt;The Emerging Security Challenge of 5G Satellites&lt;/b&gt;&lt;/p&gt;&lt;p&gt;One of the most forward-looking parts of the webinar focused on non-terrestrial networks and direct-to-device satellite connectivity. What was once a concept for the distant future is rapidly becoming a commercial reality.&lt;/p&gt;&lt;p&gt;Satellite integration promises to extend 5G coverage to remote areas, oceans and disaster zones. However, it also changes the security model in fundamental ways. Satellites can act either as simple relay systems or as active components of the mobile radio access network. In both cases, new threat vectors emerge.&lt;/p&gt;&lt;p&gt;Potential issues discussed included the risk of denial of service against shared satellite resources, difficulties in applying traditional radio security controls in space-based equipment, and the possibility of more precise user tracking due to the way satellite systems handle location information.&lt;/p&gt;&lt;p&gt;Experts from the space cybersecurity community explained how vulnerabilities in mission control software and ground segment infrastructure could be exploited. Much of this software was originally designed for isolated environments and is only now being connected to wider networks and the internet.&lt;/p&gt;&lt;p&gt;As telecom networks expand beyond the boundaries of the Earth, security responsibilities extend with them. Operators will need to think not only about terrestrial threats but also about risks originating from space-based components.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLP37tsN8iqKNEzIU2EeUBpPTDUrlDVxgrolK-zDss24M6-tX7SXe5T0dly4fkF-SgF6t9vgoDLUeyc-5EIn-SfNbqHh4I03JXf9eRt_-HTPOYOVGpqL5BIY-0ckVGj2CGmN3vHoNb8jXwGcAAb2rHIGTziH2lStPbSJYp7-p-2MFAvpM-gkGmhWInSoY/s1920/SecurityGen_TelecomSecurityRealitiesFrom2025_6.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1080&quot; data-original-width=&quot;1920&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLP37tsN8iqKNEzIU2EeUBpPTDUrlDVxgrolK-zDss24M6-tX7SXe5T0dly4fkF-SgF6t9vgoDLUeyc-5EIn-SfNbqHh4I03JXf9eRt_-HTPOYOVGpqL5BIY-0ckVGj2CGmN3vHoNb8jXwGcAAb2rHIGTziH2lStPbSJYp7-p-2MFAvpM-gkGmhWInSoY/w640-h360/SecurityGen_TelecomSecurityRealitiesFrom2025_6.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;b&gt;The Human Factor and the Skills Gap&lt;/b&gt;&lt;/p&gt;&lt;p&gt;Technology was only part of the story. Another recurring theme was the global shortage of skilled telecom cybersecurity professionals.&lt;/p&gt;&lt;p&gt;Studies referenced in the session suggested that millions of additional specialists are needed worldwide, yet only a fraction of that demand can currently be filled. Many security teams are overwhelmed by the sheer volume of alerts and data they must process.&lt;/p&gt;&lt;p&gt;This shortage has real consequences. When teams are stretched thin, patching is delayed, anomalies are missed and complex investigations become difficult to sustain. The panel emphasised that throwing more tools at the problem is not enough. Organisations must focus on training, automation and smarter operational processes.&lt;/p&gt;&lt;p&gt;Automation and AI-driven analysis were presented as essential enablers. Given the scale of modern mobile networks, it is simply not feasible for human analysts to monitor every signalling protocol, every core interface and every emerging technology manually.&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;b&gt;Preparing for 2026&lt;/b&gt;&lt;/p&gt;&lt;p&gt;Looking ahead, the experts agreed on several broad trends. Attacks on legacy systems such as SS7 will continue. Fraudsters will increasingly target eSIM provisioning processes. VoLTE and 5G core components will face growing scrutiny. Satellite-based connectivity will introduce new and unfamiliar security questions.&lt;/p&gt;&lt;p&gt;Perhaps most importantly, the line between traditional telecom security and general cybersecurity will continue to blur. Mobile networks are now large, distributed IT platforms, and they inherit all the complexities that come with that transformation.&lt;/p&gt;&lt;p&gt;Operators, regulators and vendors must therefore adopt a holistic view. Investment must go beyond compliance reporting and focus on practical defences, real time monitoring and collaborative intelligence sharing.&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;b&gt;Final Reflections&lt;/b&gt;&lt;/p&gt;&lt;p&gt;The SecurityGen webinar provided a valuable snapshot of an industry at a crossroads. Telecom networks are becoming more advanced and more capable, but also more complex and interconnected than ever before.&lt;/p&gt;&lt;p&gt;2025 demonstrated that attackers do not always need new vulnerabilities. Often they succeed simply by exploiting old weaknesses in smarter ways. The challenge for 2026 is to close those gaps while also preparing for the technologies that are only just beginning to emerge.&lt;/p&gt;&lt;p&gt;For those involved in telecom security, the full discussion is well worth watching. The complete webinar recording can be viewed below:&lt;/p&gt;&lt;p&gt;&lt;iframe allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;315&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; src=&quot;https://www.youtube.com/embed/WLb6-IfScLA?si=B9sYgDHEiNAPqUtU&quot; title=&quot;YouTube video player&quot; width=&quot;560&quot;&gt;&lt;/iframe&gt;&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;b&gt;Related Posts:&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2025/10/evolving-communication-security-towards.html&quot;&gt;Evolving Communication Security Towards 6G at the ETSI Security Conference 2025&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2024/09/detection-of-real-world-fake-base.html&quot;&gt;Detection of Real-world Fake Base Station (FBS) Attacks in Thailand&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2024/06/attack-surfaces-for-different.html&quot;&gt;Attack Surfaces for Different Generations of Mobile Technologie&lt;/a&gt;s&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2023/11/etsi-security-conference-2023.html&quot;&gt;Presentations from ETSI Security Conference 2023&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2023/05/top-10-new-2022-security-standards-that.html&quot;&gt;Top 10 New (2022) Security Standards That You Need to Know About!&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2023/01/authentication-and-key-management-for.html&quot;&gt;Authentication and Key Management for Applications (AKMA) based on 3GPP credentials in the 5G System (5GS)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2022/07/5g-and-cyber-security.html&quot;&gt;5G and Cyber Security&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2021/03/everything-you-need-to-know-about-5g.html&quot;&gt;Everything you need to know about 5G Security&lt;/a&gt;&lt;/li&gt;&lt;li&gt;3G4G: &lt;a href=&quot;https://www.3g4g.co.uk/Security/&quot;&gt;Security in 2G, 3G, 4G &amp;amp; 5G Mobile Networks&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;</description><link>https://blog.3g4g.co.uk/2026/01/telecom-security-realities-from-2025.html</link><author>noreply@blogger.com (Zahid Ghadialy)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLHsGDJzHDar4jng4tVnyMKVgGHWTtKB6FaOz86jNbIY863rFOuNsh3OoCcLlqpwyJxKAi2ZefUmrXtKB8qpO0HlOBYk9pFLeHF3cKJHgI-6sZmEUwlx1lrAy48EUTTRmrZolMhkQ-lKZIfil41ITuNIS2epey3htRoV2J8P6fGNH0zbXv5nBGl2tHgN0/s72-w640-h360-c/SecurityGen_TelecomSecurityRealitiesFrom2025_1.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1834236085756782640.post-8519862613036552471</guid><pubDate>Wed, 31 Dec 2025 07:35:00 +0000</pubDate><atom:updated>2025-12-31T08:03:33.289+00:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">General</category><title>Top 10 Posts for 2025</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMzfvjycK3edNBICYl3uXShhg5r-dGGk1W1oXu4R5Czthdp3wj0qjVojovyXhuNC50ne3T7aoDS6oXeJPygptsrkuVkWsCDd6XAJ1JSyoBZvh31G-86bHceY8ScPwOiLU14B7JtphGtA-yegAdo59YAB4ipmbsrSZ119H7GPsOswYu2p9SKPuodb6EohY/s1920/The3G4GBlog_TopPosts2025.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1080&quot; data-original-width=&quot;1920&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMzfvjycK3edNBICYl3uXShhg5r-dGGk1W1oXu4R5Czthdp3wj0qjVojovyXhuNC50ne3T7aoDS6oXeJPygptsrkuVkWsCDd6XAJ1JSyoBZvh31G-86bHceY8ScPwOiLU14B7JtphGtA-yegAdo59YAB4ipmbsrSZ119H7GPsOswYu2p9SKPuodb6EohY/w640-h360/The3G4GBlog_TopPosts2025.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;As we come to the end of another busy year, it is time once again to look back at what readers found most interesting on The 3G4G Blog. This year we again crossed over 3 million views, the same as last year, which shows the consistently strong interest in mobile technology, standards, and real-world deployments.&lt;/p&gt;&lt;p&gt;With well over 2,000 blog posts now published since the blog began in 2007, it is always fascinating to see which topics continue to attract attention. Some posts reflect the latest developments, while others are long-standing fundamentals that engineers, students, and professionals still search for regularly.&lt;/p&gt;&lt;p&gt;Regardless of when they were published, these were the top 10 most-read posts on the blog this year:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ol style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;a href=&quot;https://blog.3g4g.co.uk/2024/08/3gpp-release-18-description-and-summary.html&quot; target=&quot;_blank&quot;&gt;3GPP Release 18 Description and Summary of Work Items&lt;/a&gt;, Aug 2024&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://blog.3g4g.co.uk/2025/04/5g-advanced-store-and-forward-s.html&quot; target=&quot;_blank&quot;&gt;5G-Advanced Store and Forward (S&amp;amp;F): Enabling Resilient IoT Communications via Satellite&lt;/a&gt;, Apr 2025&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://blog.3g4g.co.uk/2013/08/volte-bearers.html&quot; target=&quot;_blank&quot;&gt;VoLTE Bearers&lt;/a&gt;, Aug 2013&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://blog.3g4g.co.uk/2009/03/difference-between-sdu-and-pdu.html&quot; target=&quot;_blank&quot;&gt;Difference between SDU and PDU&lt;/a&gt;, Mar 2009&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://blog.3g4g.co.uk/2021/11/network-slicing-using-user-equipment.html&quot; target=&quot;_blank&quot;&gt;Network Slicing using User Equipment Route Selection Policy (URSP)&lt;/a&gt;, Nov 2021&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://blog.3g4g.co.uk/2011/03/lte-to-3g-handover-procedure-and.html&quot; target=&quot;_blank&quot;&gt;LTE to 3G Handover Procedure and Signalling&lt;/a&gt;, Mar 2011&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://blog.3g4g.co.uk/2019/11/introduction-to-atsss-access-traffic.html&quot; target=&quot;_blank&quot;&gt;Introduction to 5G ATSSS - Access Traffic Steering, Switching and Splitting&lt;/a&gt;, Nov 2019&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://blog.3g4g.co.uk/2010/07/interesting-pic-blackberry-evolution.html&quot; target=&quot;_blank&quot;&gt;Interesting Pic: Blackberry Evolution&lt;/a&gt;, Jul 2010&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://blog.3g4g.co.uk/2023/05/new-5g-ntn-spectrum-bands-in-fr1-and-fr2.html&quot; target=&quot;_blank&quot;&gt;New 5G NTN Spectrum Bands in FR1 and FR2&lt;/a&gt;, May 2023&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://blog.3g4g.co.uk/2022/01/what-is-rf-front-end-rffe-and-why-is-it.html&quot; target=&quot;_blank&quot;&gt;What is RF Front-End (RFFE) and why is it so Important?&lt;/a&gt;, Jan 2022&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;It is interesting, although not entirely surprising, that a mix of 3GPP standards content, mobility procedures, and radio fundamentals continues to dominate the rankings. Posts written more than a decade ago still feature strongly, which highlights how many people continue to rely on them for reference and learning.&lt;/p&gt;&lt;p&gt;At the same time, more recent topics such as 3GPP Release 18, 5G-Advanced, and NTN show where industry activity and curiosity are heading as networks continue to evolve.&lt;/p&gt;&lt;p&gt;In addition to the 5G-Advanced Store and Forward (S&amp;amp;F) blog post, which was comfortably the most-read new post this year, the next most popular posts published in 2025 were:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ol style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;a href=&quot;https://blog.3g4g.co.uk/2025/03/aiml-in-3gpp-progress-challenges-and.html&quot; target=&quot;_blank&quot;&gt;AI/ML in 3GPP: Progress, Challenges, and the Road to 6G&lt;/a&gt;, Mar 2025&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://blog.3g4g.co.uk/2025/08/understanding-l1l2-triggered-mobility.html&quot; target=&quot;_blank&quot;&gt;Understanding L1/L2 Triggered Mobility (LTM) Procedure in 3GPP Release 18&lt;/a&gt;, Aug 2025&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://blog.3g4g.co.uk/2025/07/the-evolution-of-3gpp-5g-network-slice.html&quot; target=&quot;_blank&quot;&gt;The Evolution of 3GPP 5G Network Slice and Service Types (SSTs)&lt;/a&gt;, Jul 2025&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;AI and Machine Learning, mobility optimisation, and network slicing all remain strong areas of interest as the industry continues to mature 5G and look ahead to the next generation.&lt;/p&gt;&lt;p&gt;A big thank you to everyone who reads, comments, shares, and supports the blog. Whether you have been following since the early 3G days or discovered the site more recently, your continued engagement is what keeps it going.&lt;/p&gt;&lt;p&gt;Here is to another year of learning, sharing, and exploring the evolving world of mobile and wireless technology.&lt;/p&gt;&lt;div&gt;&lt;b&gt;Related Posts&lt;/b&gt;:&amp;nbsp;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Telecoms Infrastructure Blog: &lt;a href=&quot;https://www.telecomsinfrastructure.com/2025/12/top-10-posts-for-2025.html&quot;&gt;Top 10 Posts for 2025&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Free 6G Training: &lt;a href=&quot;https://www.free6gtraining.com/2025/12/top-10-posts-for-2025.html&quot;&gt;Top 10 Posts for 2025&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Private Networks Technology Blog: &lt;a href=&quot;https://blog.privatenetworks.technology/2025/12/top-5-posts-for-2025.html&quot;&gt;Top 5 Posts for 2025&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Operator Watch Blog: &lt;a href=&quot;https://www.operatorwatch.com/2025/12/top-5-posts-for-2025.html&quot;&gt;Top 5 Posts for 2025&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Connectivity Technology Blog: &lt;a href=&quot;https://www.connectivity.technology/2025/12/top-5-posts-for-2025.html&quot;&gt;Top 5 Posts for 2025&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2024/12/top-posts-and-videos-of-2024.html&quot;&gt;Top Posts and Videos of 2024&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2023/12/top-10-blog-posts-and-top-5-videos-for.html&quot;&gt;Top 10 Blog Posts and Top 5 Videos for 2023&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2022/12/top-blog-posts-of-2022.html&quot;&gt;Top Blog Posts of 2022&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;</description><link>https://blog.3g4g.co.uk/2025/12/top-10-posts-for-2025.html</link><author>noreply@blogger.com (Zahid Ghadialy)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMzfvjycK3edNBICYl3uXShhg5r-dGGk1W1oXu4R5Czthdp3wj0qjVojovyXhuNC50ne3T7aoDS6oXeJPygptsrkuVkWsCDd6XAJ1JSyoBZvh31G-86bHceY8ScPwOiLU14B7JtphGtA-yegAdo59YAB4ipmbsrSZ119H7GPsOswYu2p9SKPuodb6EohY/s72-w640-h360-c/The3G4GBlog_TopPosts2025.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1834236085756782640.post-7196193927619532914</guid><pubDate>Thu, 18 Dec 2025 07:35:00 +0000</pubDate><atom:updated>2025-12-18T10:53:15.230+00:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">5G</category><category domain="http://www.blogger.com/atom/ns#">Backhaul</category><category domain="http://www.blogger.com/atom/ns#">Fibre Optics</category><category domain="http://www.blogger.com/atom/ns#">Microwave</category><category domain="http://www.blogger.com/atom/ns#">Mpirical</category><category domain="http://www.blogger.com/atom/ns#">Transport Network</category><title>Transport Networks Holding Modern Mobile Architectures Together</title><description>&lt;p&gt;When people talk about mobile networks, the conversation almost always starts with the air interface. Spectrum, waveforms, MIMO, antennas and radios dominate conference agendas, white papers and training courses. After that comes the RAN, then the core, and occasionally backhaul is given a brief mention. What sits quietly in the middle of all this, often taken for granted, is the transport network. Yet without a well designed transport layer, even the most advanced radio and core architecture struggles to deliver on its promises.&lt;/p&gt;&lt;p&gt;Transport networks are the connective tissue of mobile communications. They carry traffic between radio sites, aggregation layers, edge and regional data centres, and the core network. As highlighted in the accompanying Mpirical video, transport is not a single homogeneous network but an end to end topology made up of multiple architectural domains, each with different performance, scale and resilience requirements.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhv5LRHs8amlGRzUzkwJiNtRfnc0dLVP3pwJjA9sUjEoyqBTkdjRkZftoffSWYcpXWhd4rMx3n895NvXPY_jKqLeES0u0A5m8ZJ9zuO493X-0aGDq8pItVFlTfdrrQZSWFFUj1ut0izDNVSkD7MnzvtPAVx4Glu1AcQLiz0DLl4wbpVXx9u_IMb9Mb5iFU/s1920/Mpirical_TransportNetworkTopology.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1080&quot; data-original-width=&quot;1920&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhv5LRHs8amlGRzUzkwJiNtRfnc0dLVP3pwJjA9sUjEoyqBTkdjRkZftoffSWYcpXWhd4rMx3n895NvXPY_jKqLeES0u0A5m8ZJ9zuO493X-0aGDq8pItVFlTfdrrQZSWFFUj1ut0izDNVSkD7MnzvtPAVx4Glu1AcQLiz0DLl4wbpVXx9u_IMb9Mb5iFU/w640-h360/Mpirical_TransportNetworkTopology.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;At the core of the network, transport is typically built using highly resilient designs such as full mesh or spine and leaf architectures. These environments are already operating at hundreds of gigabits per second per link, with clear evolution paths towards terabit scale throughput. This part of the network rarely gets attention from mobile engineers, yet it underpins everything that follows. If the core transport layer cannot scale, the rest of the mobile network inevitably hits a ceiling.&lt;/p&gt;&lt;p&gt;Moving closer to the cell site, the transport network transitions into metro and aggregation domains. Here, spine and leaf or ring based topologies are commonly used, supporting large numbers of high capacity connections while also providing access to edge and regional data centres. This is where transport starts to intersect directly with mobile architecture decisions. The placement of edge computing platforms, local breakout, and centralised RAN functions all depend on the capabilities of this aggregation layer.&lt;/p&gt;&lt;p&gt;Closer still to the access network, transport designs often shift again. Ring, star or chain topologies are frequently used to connect clusters of cell sites, with capacities that reflect both traffic demand and economic constraints. Although fibre is the dominant medium, especially for 5G, it is rarely the only one. Microwave, integrated access and backhaul, and even non terrestrial technologies play an increasingly important role in extending coverage and improving resilience where fibre is impractical or unavailable.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-ynBPiU7WurpBzEKW3nb8hjBGJSIVIZf1Jk-LS9gFcwv2RpV2i9j0ArlUzpvhovC-JqarCebYHdbAsd7ame5d6eRzRTtsv065HTDOxbir191JS0ekVAPSqabKS-yk_ki3xuhQwkdpDdMvu7QftL_0W7tobqkeCQvRPMgMZo1_4pADce0geAsDavE2x3Q/s1920/Mpirical_TransportNetworkExampleForDisaggregatedGnb.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1080&quot; data-original-width=&quot;1920&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-ynBPiU7WurpBzEKW3nb8hjBGJSIVIZf1Jk-LS9gFcwv2RpV2i9j0ArlUzpvhovC-JqarCebYHdbAsd7ame5d6eRzRTtsv065HTDOxbir191JS0ekVAPSqabKS-yk_ki3xuhQwkdpDdMvu7QftL_0W7tobqkeCQvRPMgMZo1_4pADce0geAsDavE2x3Q/w640-h360/Mpirical_TransportNetworkExampleForDisaggregatedGnb.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;The importance of transport becomes even clearer when viewed through the lens of disaggregated RAN and cloud based architectures. With gNodeB functions split into remote radio units, distributed units and centralised units, transport is no longer just backhaul. It becomes fronthaul and midhaul as well, each with distinct latency, synchronisation and bandwidth requirements. Centralised units may sit deep in the network, served by high capacity backhaul, while distributed units are connected via midhaul rings and radios are attached using star or ring topologies at the very edge.&lt;/p&gt;&lt;p&gt;This architectural shift exposes a common blind spot. Many performance issues blamed on the RAN are in fact rooted in transport limitations. Synchronisation accuracy, latency variation and resilience all depend heavily on transport design and operation. Packet based transport, while flexible and cost effective, places strict demands on timing and quality that cannot be treated as an afterthought.&lt;/p&gt;&lt;p&gt;As networks move towards 5G standalone, private networks and early 6G concepts, transport will become even more tightly coupled with service delivery. Network slicing, deterministic performance and edge driven applications all rely on a transport layer that can offer predictable behaviour rather than best effort connectivity. This pushes transport out of the shadows and into the critical path of mobile network design.&lt;/p&gt;&lt;p&gt;The 5G Transport Network Topology video as follows:&lt;/p&gt;&lt;p&gt;&lt;iframe allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;315&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; src=&quot;https://www.youtube.com/embed/a0eXy_Vspmg?si=6XqLbB6jPpwE1v7l&quot; title=&quot;YouTube video player&quot; width=&quot;560&quot;&gt;&lt;/iframe&gt;&lt;/p&gt;&lt;p&gt;For mobile engineers, the message is clear. Understanding the air interface will always be essential, but it is no longer enough. Transport networks shape where functions can be placed, how services perform, and how networks scale over time. The video embedded alongside this post provides a useful visual reminder that mobile networks are not just radios and cores connected by invisible links. Transport is a network in its own right, and it deserves far more attention than it usually gets.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Related Posts&lt;/b&gt;:&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;The 3G4G Blog - &lt;a href=&quot;https://blog.3g4g.co.uk/2025/11/iet-lecture-by-prof-andy-sutton-point.html&quot;&gt;IET Lecture by Prof. Andy Sutton: Point to Point Microwave Radio Systems&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Free 6G Training: &lt;a href=&quot;https://www.free6gtraining.com/2025/09/the-future-role-of-transport-networks.html&quot;&gt;The Future Role of Transport Networks in 6G&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Free 6G Training: &lt;a href=&quot;https://www.free6gtraining.com/2025/09/the-role-of-all-photonics-network-apn.html&quot;&gt;The Role of the All-Photonics Network (APN) in IOWN and Future 6G&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Connectivity Technology Blog: &lt;a href=&quot;https://www.connectivity.technology/2019/08/an-introduction-to-different-types-of.html&quot;&gt;An Introduction to Different Types of Backhaul&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog - &lt;a href=&quot;https://blog.3g4g.co.uk/2018/04/cwheritage-talk-history-of.html&quot;&gt;CWHeritage Talk: The History of Synchronization in Digital Cellular Networks&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;</description><link>https://blog.3g4g.co.uk/2025/12/transport-networks-holding-modern.html</link><author>noreply@blogger.com (Zahid Ghadialy)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhv5LRHs8amlGRzUzkwJiNtRfnc0dLVP3pwJjA9sUjEoyqBTkdjRkZftoffSWYcpXWhd4rMx3n895NvXPY_jKqLeES0u0A5m8ZJ9zuO493X-0aGDq8pItVFlTfdrrQZSWFFUj1ut0izDNVSkD7MnzvtPAVx4Glu1AcQLiz0DLl4wbpVXx9u_IMb9Mb5iFU/s72-w640-h360-c/Mpirical_TransportNetworkTopology.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1834236085756782640.post-5751482092509357552</guid><pubDate>Tue, 25 Nov 2025 07:35:00 +0000</pubDate><atom:updated>2025-11-25T18:26:52.978+00:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">4G</category><category domain="http://www.blogger.com/atom/ns#">5G</category><category domain="http://www.blogger.com/atom/ns#">Backhaul</category><category domain="http://www.blogger.com/atom/ns#">BT / EE</category><category domain="http://www.blogger.com/atom/ns#">Fibre Optics</category><category domain="http://www.blogger.com/atom/ns#">IET</category><category domain="http://www.blogger.com/atom/ns#">mmWave</category><category domain="http://www.blogger.com/atom/ns#">Spectrum</category><category domain="http://www.blogger.com/atom/ns#">UK</category><category domain="http://www.blogger.com/atom/ns#">Videos</category><title>IET Lecture by Prof. Andy Sutton: Point to Point Microwave Radio Systems </title><description>&lt;div style=&quot;text-align: left;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2ZoQoTCr7-AZW4jv8RLWOTwlkgpSD68ZEMO4aQu0R311aQs2D4xfrqbS-wmhX49o5jlYWfTezldmbpDYtmvCxr1x1chr_ulNfpTHWAdhm_WIR2sJfrxVY7DC1aoliz32UkBlz7fDU9swPn648FdbdJiY4pT9jD-fsT_2fLyBjMVtkPbQ8-02MjIn4EGw/s1920/ProfAnySutton_IETLecture1.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1080&quot; data-original-width=&quot;1920&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2ZoQoTCr7-AZW4jv8RLWOTwlkgpSD68ZEMO4aQu0R311aQs2D4xfrqbS-wmhX49o5jlYWfTezldmbpDYtmvCxr1x1chr_ulNfpTHWAdhm_WIR2sJfrxVY7DC1aoliz32UkBlz7fDU9swPn648FdbdJiY4pT9jD-fsT_2fLyBjMVtkPbQ8-02MjIn4EGw/w640-h360/ProfAnySutton_IETLecture1.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Point to point microwave radio systems have been with us for more than eighty years, yet they rarely attract much attention in an era where fibre dominates network planning and satellite systems continue to develop at pace. At a recent &lt;a href=&quot;https://localevents.theiet.org/register.php?event=6fead4&quot; target=&quot;_blank&quot;&gt;IET Anglian Coastal Local Network event&lt;/a&gt;, Prof. Andy Sutton delivered an excellent lecture that brought these fixed radio links back into the spotlight. His talk explored the history, engineering and future of microwave and millimetre wave links, reminding us why they remain essential for transmission networks in the UK and around the world.&lt;/p&gt;&lt;p&gt;The story begins with the national microwave radio network of the 1970s, with the BT Tower at its centre. These early deployments supported long links across the country and laid the foundation for many of the design principles still used today. While the landscape has changed significantly, the fundamentals of fixed radio communication continue to be shaped by spectrum availability, propagation characteristics and careful engineering.&lt;/p&gt;&lt;p&gt;Microwave links depend on a wide range of bands, from the lower 6 GHz region through to 80 GHz E-band. The choice of frequency affects everything from link length to susceptibility to atmospheric absorption. As Andy explained, a link designer must consider not just free space path loss, but also Fresnel zone clearance, rainfall intensity and antenna characteristics. The slides included a worked example that showed the impact of frequency and distance on the radius of the Fresnel zone and highlighted the need for adequate clearance to maintain availability over time.&lt;/p&gt;&lt;p&gt;The talk moved on to modern access radio systems, where compact rooftop nodes and all-outdoor radios have become common. These systems rely on careful use of vertical and horizontal polarisations, often enabled through XPIC technology. XPIC allows separate data streams to coexist on the same frequency using orthogonal polarisations, effectively doubling link capacity when conditions allow. This is paired with adaptive coding and modulation, which enables the radio to shift modulation schemes according to link quality. The result is a more resilient and efficient link compared to older fixed-modulation systems.&lt;/p&gt;&lt;p&gt;Capacity planning is a balancing act that involves radio channel bandwidth, modulation choice and the number of aggregated carriers. Wider channels and higher order modulation support multi-gigabit throughput, although this introduces penalties in transmit power and receiver sensitivity. The trade-offs are central to radio design and determine the type of equipment used, whether through a separate indoor and outdoor unit or an integrated all-outdoor system.&lt;/p&gt;&lt;p&gt;Andy also covered the practical elements of radio link planning, such as antenna selection, path profiling, waveguide losses and typical link budget calculations. A link planning example using a 32 GHz radio demonstrated the relationship between transmit power, antenna gain, free space loss and fade margin for a target availability of 99.99 percent. The discussion tied together the theoretical foundations with real-world engineering and illustrated how access radios are designed for street-level backhaul scenarios.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivE9-j7duVG1UtM8UuGg6ZKmDJcZUk74Z94DzhuLRtNvnc-6J4dVAP7s_v-6joQrEpXZKNJrr3ngWgp50_FaopfR5iU7_GnZyacQRPG_V9ituk84xZKmlUfpm6vzNvAvO8hoKHOsUoRNIZFOYRLtJpuY03k09N40yumDhZoTPQqV5Dkr0Ak5zLK21tvAE/s1920/ProfAnySutton_IETLecture2.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1080&quot; data-original-width=&quot;1920&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivE9-j7duVG1UtM8UuGg6ZKmDJcZUk74Z94DzhuLRtNvnc-6J4dVAP7s_v-6joQrEpXZKNJrr3ngWgp50_FaopfR5iU7_GnZyacQRPG_V9ituk84xZKmlUfpm6vzNvAvO8hoKHOsUoRNIZFOYRLtJpuY03k09N40yumDhZoTPQqV5Dkr0Ak5zLK21tvAE/w640-h360/ProfAnySutton_IETLecture2.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;The lecture then moved to millimetre wave systems, particularly E-band radios that operate around 70 and 80 GHz. These links offer enormous capacity over shorter distances and are increasingly used for dense urban backhaul and enterprise connectivity. The slides included examples of network topologies showing how microwave and fibre can be combined to meet different deployment objectives.&lt;/p&gt;&lt;p&gt;A substantial part of the presentation focused on trunk or core microwave radio systems. These high-capacity, high-availability links support long distances and historically formed the backbone of national networks. Although demand for trunk links has reduced as fibre has spread, they still exist in challenging environments. In the UK, many trunk links remain operational in Scotland and island regions where terrain and geography limit fibre deployment. The lecture covered branching networks, duplexers, waveguide installations and space diversity techniques, all of which contribute to the reliability of long-haul links.&lt;/p&gt;&lt;p&gt;Looking ahead, research continues into new frequency bands, wider channels, higher modulation schemes and improved radio hardware. These advances will support even greater capacities, with millimetre wave links expected to reach 100 Gbps over short distances. Microwave radio may no longer be the headline technology it once was, but the field continues to push boundaries and remains an essential part of modern communication networks.&lt;/p&gt;&lt;p&gt;Andy’s lecture was a comprehensive tour of the past, present and future of point to point microwave systems. For anyone working in transmission, mobile networks or wireless engineering, it served as a valuable reminder of the depth of innovation in this area and its continued relevance in the broader ecosystem.&lt;/p&gt;&lt;p&gt;If you would like to explore the material in more detail, the slides from the event are available &lt;a href=&quot;https://engx.theiet.org/cfs-filesystemfile/__key/articles/40fd281d6abe42ca943d0780c6c3d8a9-a-8f4b8a2b82a44278808d012e95d88259/MW-radio-systems-_2D00_-ACLN-v2-with-top-and-tail.pdf&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt; and the video can be seen &lt;a href=&quot;https://vimeo.com/1135084789/8362070f9b&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;. Both are well worth a look.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Related Posts&lt;/b&gt;:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Connectivity Technology Blog - &lt;a href=&quot;https://www.connectivity.technology/2020/08/5g-demystified-what-when-and-where-by.html&quot;&gt;5G Demystified; the What, When and Where by Prof. Andy Sutton, BT&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog - &lt;a href=&quot;https://blog.3g4g.co.uk/2020/01/prof-andy-sutton-backhauling-5g.html&quot;&gt;Prof. Andy Sutton: Backhauling the 5G Experience - Jan 2020&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog - &lt;a href=&quot;https://blog.3g4g.co.uk/2019/02/prof-andy-sutton-5g-radio-access.html&quot;&gt;Prof. Andy Sutton: 5G Radio Access Network Architecture Evolution - Jan 2019&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2018/01/5g-network-architecture-design-and.html&quot;&gt;5G Network Architecture, Design and Optimisation - Jan 2018&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2017/02/5g-network-architecture-and-design.html&quot;&gt;5G Network Architecture and Design Update - Jan 2017&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog - &lt;a href=&quot;https://blog.3g4g.co.uk/2018/04/cwheritage-talk-history-of.html&quot;&gt;CWHeritage Talk: The History of Synchronization in Digital Cellular Networks&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;</description><link>https://blog.3g4g.co.uk/2025/11/iet-lecture-by-prof-andy-sutton-point.html</link><author>noreply@blogger.com (Zahid Ghadialy)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2ZoQoTCr7-AZW4jv8RLWOTwlkgpSD68ZEMO4aQu0R311aQs2D4xfrqbS-wmhX49o5jlYWfTezldmbpDYtmvCxr1x1chr_ulNfpTHWAdhm_WIR2sJfrxVY7DC1aoliz32UkBlz7fDU9swPn648FdbdJiY4pT9jD-fsT_2fLyBjMVtkPbQ8-02MjIn4EGw/s72-w640-h360-c/ProfAnySutton_IETLecture1.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1834236085756782640.post-79241089403276393</guid><pubDate>Tue, 04 Nov 2025 07:35:00 +0000</pubDate><atom:updated>2025-11-04T08:22:22.216+00:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">3GPP</category><category domain="http://www.blogger.com/atom/ns#">5G-Advanced</category><category domain="http://www.blogger.com/atom/ns#">6G</category><category domain="http://www.blogger.com/atom/ns#">Artificial Intelligence</category><category domain="http://www.blogger.com/atom/ns#">Ericsson</category><category domain="http://www.blogger.com/atom/ns#">Future Technologies</category><category domain="http://www.blogger.com/atom/ns#">Internet of Things</category><category domain="http://www.blogger.com/atom/ns#">LGU+</category><category domain="http://www.blogger.com/atom/ns#">Oppo</category><category domain="http://www.blogger.com/atom/ns#">Release 19</category><category domain="http://www.blogger.com/atom/ns#">Supermicro</category><category domain="http://www.blogger.com/atom/ns#">Transforma Insights</category><category domain="http://www.blogger.com/atom/ns#">Videos</category><title>AIoT and A-IoT</title><description>&lt;p&gt;Our industry loves acronyms. In fact, sometimes it feels as if half our job is simply keeping up with them, while the other half is explaining them to everyone else. A recent example I saw referenced D2D for satellites, but expanded it as Device to Device instead of Direct to Device. Today, two similar acronyms are gaining momentum and are likely to become far more mainstream: AIoT and A-IoT.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiGnUbDM9BLFlTgLyzvZo71DqFKTWZTRrHHoXt2nOAa0Gwn3BTduVSze4Mf37NLMMlMls62qMOOTgXq5KDzh4R2i49FSMcA9BMLOl3gQSqSDp14DGxMawWWhO6Mh_vuswhFdiTnG5hUufLzr18DTsepOjRhTJlezZNp2ekjDAipcwEsscRGKjXyR59fTaY/s1920/AIoT_A-IoT.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1080&quot; data-original-width=&quot;1920&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiGnUbDM9BLFlTgLyzvZo71DqFKTWZTRrHHoXt2nOAa0Gwn3BTduVSze4Mf37NLMMlMls62qMOOTgXq5KDzh4R2i49FSMcA9BMLOl3gQSqSDp14DGxMawWWhO6Mh_vuswhFdiTnG5hUufLzr18DTsepOjRhTJlezZNp2ekjDAipcwEsscRGKjXyR59fTaY/w640-h360/AIoT_A-IoT.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Artificial Intelligence (AI) and the Internet of Things (IoT) are two of the key technological pillars of the modern digital world. IoT connects billions of devices, from sensors and cameras to industrial machinery, all producing vast amounts of useful data. AI enables these devices and systems to learn from this data, recognise patterns, predict outcomes, and act autonomously.&lt;/p&gt;&lt;p&gt;When these technologies come together, we get the Artificial Intelligence of Things, or AIoT. In simple terms, AIoT allows connected devices to analyse the data they generate and make decisions without always relying on central systems.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgFFckSe4WWsVxyyBqBmISPtnGYBpIJLaMFiNe7Jc3XHNheFujdQq6QqezYlQNO3Td_PLR6SySO8zc0_jS9px_r7Uv7p5JT-2RtuCrHzgWEwcZDqkVS8ZgI4IHwSLAAnlU6j6M9lbGF3TGFO0IqFOBaVim4u0r2YDpUfdMiCMgbiBDY_WWsze5XStE4RIM/s3523/TransformaInsights_AIoT-convergence-AI-IoT.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;2205&quot; data-original-width=&quot;3523&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgFFckSe4WWsVxyyBqBmISPtnGYBpIJLaMFiNe7Jc3XHNheFujdQq6QqezYlQNO3Td_PLR6SySO8zc0_jS9px_r7Uv7p5JT-2RtuCrHzgWEwcZDqkVS8ZgI4IHwSLAAnlU6j6M9lbGF3TGFO0IqFOBaVim4u0r2YDpUfdMiCMgbiBDY_WWsze5XStE4RIM/w640-h400/TransformaInsights_AIoT-convergence-AI-IoT.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;The intelligence in AIoT can sit in different places. Cloud based AI offers extensive processing power and the ability to leverage wider datasets. Edge AI processes data closer to where it is generated, enabling faster and more context aware decision making while reducing bandwidth use and protecting data privacy. Increasingly, lightweight machine learning models allow intelligence directly on devices themselves, enabling instant reactions without constant network access. This evolution transforms IoT devices from passive data collectors into proactive decision makers.&lt;/p&gt;&lt;p&gt;The benefits are significant. AIoT increases automation, improves efficiency, enhances reliability, and enables predictive maintenance, energy optimisation, autonomous navigation, and smarter logistics. It also supports sustainability initiatives, for instance by improving energy and water use monitoring or enabling more intelligent control of municipal utilities. In short, AIoT forms a key part of the digital transformation strategies emerging across industries.&lt;/p&gt;&lt;p&gt;To get a better sense of how AIoT could shape our everyday lives, I have embedded a couple of older Ericsson videos below that imagine a future where intelligence is seamlessly built into everything.&lt;/p&gt;&lt;p&gt;&lt;iframe allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;315&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; src=&quot;https://www.youtube.com/embed/videoseries?si=uf4tgH66sOtzJwK9&amp;amp;list=PLBC3G7CyizTr2HBl78B4x4am87dtx5hPV&quot; title=&quot;YouTube video player&quot; width=&quot;560&quot;&gt;&lt;/iframe&gt;&lt;/p&gt;&lt;p&gt;For anyone interested in going deeper into this topic, &lt;a href=&quot;https://transformainsights.com/aiot&quot; target=&quot;_blank&quot;&gt;Transforma Insights&lt;/a&gt; and &lt;a href=&quot;https://www.supermicro.com/en/glossary/aiot&quot; target=&quot;_blank&quot;&gt;Supermicro&lt;/a&gt; have good explainers. While 3GPP continues to work on AI, ML and IoT, AIoT as a concept is largely implementation driven rather than a standardised feature in itself.&lt;/p&gt;&lt;p&gt;In contrast, 3GPP is actively defining a different acronym: A-IoT, short for Ambient IoT.&lt;/p&gt;&lt;p&gt;Ambient IoT represents a major shift in connected device design. Instead of relying on batteries or frequent charging, Ambient IoT devices operate using energy harvested from their surroundings. This can include radio signals, light, heat, or motion. The technology supports both passive operation, where devices backscatter incoming RF signals, and active operation, where they harvest enough power to generate and transmit signals independently.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPAHwKXRP5KZfw2OzuNFhCdM1tdRnR5CNGhSDASSPiPThUR1MWXUJTn4DodfKvpb1m4s4vabJH-8SDJL0CrEVah6NJTBsYqk1fVxOWxNEdWWkXadNGU6PNUlJpu5_8I60GeW3R6cwzGBM0oDw1Sy-VaQqVc8laNACZkILrL7DWZ0K86n_h55uIYbyVLS0/s1920/LGUplus_AmbientIoT.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1080&quot; data-original-width=&quot;1920&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPAHwKXRP5KZfw2OzuNFhCdM1tdRnR5CNGhSDASSPiPThUR1MWXUJTn4DodfKvpb1m4s4vabJH-8SDJL0CrEVah6NJTBsYqk1fVxOWxNEdWWkXadNGU6PNUlJpu5_8I60GeW3R6cwzGBM0oDw1Sy-VaQqVc8laNACZkILrL7DWZ0K86n_h55uIYbyVLS0/w640-h360/LGUplus_AmbientIoT.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Unlike traditional IoT devices, Ambient IoT units are extremely low power, low cost, and very simple in design. They have a shorter range and lower data throughput than conventional wireless technologies, but they excel in scenarios where massive numbers of tiny, battery-free sensors can be deployed and left to operate with minimal maintenance.&lt;/p&gt;&lt;p&gt;This makes Ambient IoT well suited to applications such as environmental sensing, supply chain tracking, inventory monitoring, smart agriculture, and intelligent labelling. It also opens opportunities in consumer environments, from smart packaging to indoor positioning. With the right network support, these devices can operate indefinitely, enabling sustainable, large-scale sensing networks.&lt;/p&gt;&lt;p&gt;Ambient IoT is already included in 5G Advanced Release 19. For those interested in learning more, &lt;a href=&quot;https://www.3gpp.org/technologies/rel19-aiot&quot; target=&quot;_blank&quot;&gt;3GPP has a detailed overview&lt;/a&gt;, Oppo has produced an excellent &lt;a href=&quot;https://www.oppo.com/content/dam/oppo/common/mkt/footer/Ambient-Power-enabled-IoT-White-Paper.pdf&quot; target=&quot;_blank&quot;&gt;white paper&lt;/a&gt;, and LG Uplus has published a &lt;a href=&quot;https://news.lguplus.com/wp-content/uploads/2024/05/6G-White-Paper_ambient-IoT_Eng.pdf&quot; target=&quot;_blank&quot;&gt;forward looking document&lt;/a&gt; exploring Ambient IoT in the context of 6G.&lt;/p&gt;&lt;p&gt;Both AIoT and Ambient IoT represent the next phase of connected intelligence. AIoT pushes computation and decision making closer to where data originates, while Ambient IoT removes power barriers and enables pervasive, maintenance-free connectivity. Together, they will support systems that are scalable, energy efficient and context aware.&lt;/p&gt;&lt;p&gt;As these technologies mature, we can expect a world where devices are not only always connected, but also constantly learning, adapting, and operating independently with minimal energy demands. The future of connectivity lies in this balance between intelligence and efficiency, and both AIoT and Ambient IoT will play a crucial role in shaping it.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Related Posts&lt;/b&gt;:&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;3G4G: &lt;a href=&quot;https://www.3g4g.co.uk/IoT/&quot;&gt;Internet of Things (IoT) and Machine-2-Machine (M2M)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2021/10/are-there-50-billion-iot-devices-yet.html&quot;&gt;Are there 50 Billion IoT Devices yet?&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Free 6G Training: &lt;a href=&quot;https://www.free6gtraining.com/2021/10/zero-energy-devices-and-air-interface.html&quot;&gt;Zero-Energy Devices and Air Interface&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Connectivity Technology Blog: &lt;a href=&quot;https://www.connectivity.technology/2019/08/interdigitals-6g-vision-of-zero-energy.html&quot;&gt;InterDigital’s 6G Vision of “Zero-energy” (ZE) air-interface designs&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2024/08/3gpp-release-18-description-and-summary.html&quot;&gt;3GPP Release 18 Description and Summary of Work Items&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2024/11/low-latency-power-saving-with-low-power.html&quot;&gt;Low Latency Power Saving with Low Power-Wake Up Signal/Receiver (LP-WUS/LP-WUR)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2023/07/small-data-transmission-sdt-in-lte-and.html&quot;&gt;Small Data Transmission (SDT) in LTE and 5G NR&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Connectivity Technology Blog: &lt;a href=&quot;https://www.connectivity.technology/2021/02/the-wide-variety-of-internet-of-things.html&quot;&gt;The Wide Variety of Internet of Things (IoT) Technologies for Different Situations&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2021/07/introduction-to-5g-reduced-capability.html&quot;&gt;Introduction to 5G Reduced Capability (RedCap) Devices&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Connectivity Technology Blog: &lt;a href=&quot;https://www.connectivity.technology/2021/09/cellular-connectivity-technology.html&quot;&gt;Cellular Connectivity Technology Landscape and Standards for Industrial IoT&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2020/07/mobile-initiated-connection-only-mico.html&quot;&gt;Mobile Initiated Connection Only (MICO) mode in 5G System&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2020/06/embedded-sim-esim-and-integrated-sim.html&quot;&gt;Embedded SIM (eSIM) and Integrated SIM (iSIM)&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;</description><link>https://blog.3g4g.co.uk/2025/11/aiot-and-iot.html</link><author>noreply@blogger.com (Zahid Ghadialy)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiGnUbDM9BLFlTgLyzvZo71DqFKTWZTRrHHoXt2nOAa0Gwn3BTduVSze4Mf37NLMMlMls62qMOOTgXq5KDzh4R2i49FSMcA9BMLOl3gQSqSDp14DGxMawWWhO6Mh_vuswhFdiTnG5hUufLzr18DTsepOjRhTJlezZNp2ekjDAipcwEsscRGKjXyR59fTaY/s72-w640-h360-c/AIoT_A-IoT.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1834236085756782640.post-7901470537885963569</guid><pubDate>Thu, 16 Oct 2025 06:35:00 +0000</pubDate><atom:updated>2025-10-16T07:49:12.752+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">3GPP</category><category domain="http://www.blogger.com/atom/ns#">5G</category><category domain="http://www.blogger.com/atom/ns#">6G</category><category domain="http://www.blogger.com/atom/ns#">Conferences and Events</category><category domain="http://www.blogger.com/atom/ns#">ETSI</category><category domain="http://www.blogger.com/atom/ns#">Security</category><title>Evolving Communication Security Towards 6G at the ETSI Security Conference 2025</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYHLEQ2-rMgn3J0aRPIXlWK9ktnJoM1xroJsU2wQCQ_gAojqX7yb5rHeLJPQV_1C94HLP00mbZ5u9Y05mTBSZsPxYglaO5rGwx0UyeqmaRfCMryM2d1kuUIEzk0JsjxFXqXOt9iYdML7IZ7djR1Bjh4LdUugcr-r2SNOZV8RWkrAF7MTBJekkIHv8f_XE/s1920/ETSISecurityConference2025.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1080&quot; data-original-width=&quot;1920&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYHLEQ2-rMgn3J0aRPIXlWK9ktnJoM1xroJsU2wQCQ_gAojqX7yb5rHeLJPQV_1C94HLP00mbZ5u9Y05mTBSZsPxYglaO5rGwx0UyeqmaRfCMryM2d1kuUIEzk0JsjxFXqXOt9iYdML7IZ7djR1Bjh4LdUugcr-r2SNOZV8RWkrAF7MTBJekkIHv8f_XE/w640-h360/ETSISecurityConference2025.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;The annual &lt;a href=&quot;https://www.etsi.org/newsroom/news/2601-etsi-security-conference-2025&quot; target=&quot;_blank&quot;&gt;ETSI Security Conference&lt;/a&gt; returned to the French Riviera from 6 to 9 October, once again bringing together the global cybersecurity community in the beautiful surroundings of ETSI headquarters. Over 250 participants from industry, government agencies, academia, global standards bodies, and open-source communities attended, making it one of the most engaging editions to date. The four-day event featured keynotes, panel discussions, technical sessions, poster presentations and live demonstrations, offering a holistic view of today’s security challenges and tomorrow’s opportunities.&lt;/p&gt;&lt;p&gt;The opening day provided a broad overview of the global cybersecurity landscape, setting the tone for the week ahead. Discussions highlighted emerging trends such as the growing influence of artificial intelligence and the rapid evolution of regulatory frameworks, including the European Commission’s Cyber Resilience Act. The sessions underscored the importance of collaboration between policymakers, researchers, and standards organisations. The afternoon focused on the cyber skills gap, a recurring theme across many sectors, stressing the need for education and training to build a security-aware workforce capable of safeguarding future digital systems. Standards were identified as key enablers in bridging policy and implementation, helping to transform regulatory intent into operational resilience.&lt;/p&gt;&lt;p&gt;The second day examined the paradox between AI as both a risk and a defence mechanism in cybersecurity. Experts discussed how AI-driven systems can expose new vulnerabilities if developed without strong security foundations, while also offering powerful tools for detection and response. Another session addressed fraud reduction and the convergence of security strategies to protect both networks and end users. A major highlight was the discussion on the global uptake of ETSI’s consumer IoT security standard, ETSI EN 303 645. Representatives from Germany, the UK, Singapore and Japan shared national experiences implementing consumer labelling schemes based on this standard, confirming its status as a globally recognised baseline for IoT security.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;blockquote class=&quot;twitter-tweet&quot;&gt;&lt;p dir=&quot;ltr&quot; lang=&quot;in&quot;&gt;3GPP SA3 Update from ETSI Security Conference 2025 - &lt;a href=&quot;https://t.co/COyRhvGcfQ&quot;&gt;https://t.co/COyRhvGcfQ&lt;/a&gt;&lt;a href=&quot;https://twitter.com/hashtag/Free5Gtraining?src=hash&amp;amp;ref_src=twsrc%5Etfw&quot;&gt;#Free5Gtraining&lt;/a&gt; &lt;a href=&quot;https://twitter.com/hashtag/3G4G5G?src=hash&amp;amp;ref_src=twsrc%5Etfw&quot;&gt;#3G4G5G&lt;/a&gt; &lt;a href=&quot;https://twitter.com/hashtag/3GPP?src=hash&amp;amp;ref_src=twsrc%5Etfw&quot;&gt;#3GPP&lt;/a&gt; &lt;a href=&quot;https://twitter.com/hashtag/5G?src=hash&amp;amp;ref_src=twsrc%5Etfw&quot;&gt;#5G&lt;/a&gt; &lt;a href=&quot;https://twitter.com/hashtag/5GAdvanced?src=hash&amp;amp;ref_src=twsrc%5Etfw&quot;&gt;#5GAdvanced&lt;/a&gt; &lt;a href=&quot;https://twitter.com/hashtag/6G?src=hash&amp;amp;ref_src=twsrc%5Etfw&quot;&gt;#6G&lt;/a&gt; &lt;a href=&quot;https://twitter.com/hashtag/ETSI?src=hash&amp;amp;ref_src=twsrc%5Etfw&quot;&gt;#ETSI&lt;/a&gt; &lt;a href=&quot;https://twitter.com/hashtag/TheStandardsPeople?src=hash&amp;amp;ref_src=twsrc%5Etfw&quot;&gt;#TheStandardsPeople&lt;/a&gt; &lt;a href=&quot;https://twitter.com/hashtag/SecurityConference?src=hash&amp;amp;ref_src=twsrc%5Etfw&quot;&gt;#SecurityConference&lt;/a&gt; &lt;a href=&quot;https://twitter.com/hashtag/3GPPSA3?src=hash&amp;amp;ref_src=twsrc%5Etfw&quot;&gt;#3GPPSA3&lt;/a&gt; &lt;a href=&quot;https://twitter.com/hashtag/Release19?src=hash&amp;amp;ref_src=twsrc%5Etfw&quot;&gt;#Release19&lt;/a&gt; &lt;a href=&quot;https://twitter.com/hashtag/Release20?src=hash&amp;amp;ref_src=twsrc%5Etfw&quot;&gt;#Release20&lt;/a&gt; &lt;a href=&quot;https://twitter.com/hashtag/Release21?src=hash&amp;amp;ref_src=twsrc%5Etfw&quot;&gt;#Release21&lt;/a&gt; &lt;a href=&quot;https://t.co/dYWlNm1xWf&quot;&gt;pic.twitter.com/dYWlNm1xWf&lt;/a&gt;&lt;/p&gt;— Free 5G Training (@5Gtraining) &lt;a href=&quot;https://twitter.com/5Gtraining/status/1977647277713092842?ref_src=twsrc%5Etfw&quot;&gt;October 13, 2025&lt;/a&gt;&lt;/blockquote&gt; &lt;script async=&quot;&quot; charset=&quot;utf-8&quot; src=&quot;https://platform.twitter.com/widgets.js&quot;&gt;&lt;/script&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The third day was dedicated to the evolution of communication technologies and the emerging security landscape as the world moves towards 6G. Chaired by Dario Sabella from xFlow Research, the morning session explored how the journey from 5G Advanced to 6G requires a fresh approach to network security. The day began with an update from Alain Sultan of ETSI on the ongoing work within 3GPP SA3, focusing on strengthening frameworks for new architectures and deployment models. Bengt Salin from Ericsson outlined what should be considered in shaping security for 6G, emphasising that the next generation must be secure by design, not by adaptation. Nauman Khan from STC analysed the threat landscape surrounding 5G MEC and private networks, noting that as edge computing becomes more widespread, it introduces new vulnerabilities but also provides insights that can guide 6G security frameworks. Leyi Zhang from ZTE then presented on Secure Space-Air-Ground Integrated Networks, a concept uniting terrestrial, aerial, and satellite systems to provide ubiquitous connectivity. Ensuring trust, authentication, and data protection across such a heterogeneous environment presents one of the greatest challenges for 6G.&lt;/p&gt;&lt;p&gt;A panel discussion moderated by Dario Sabella brought together the morning’s speakers to reflect on security priorities toward 6G. The consensus was clear: while 6G is still in the early stages of standardisation, security must not be an afterthought. Lessons from 5G—particularly regarding openness, complexity, and trust—must inform the architecture and design principles of 6G from the outset. The afternoon sessions continued with broader discussions about digital sovereignty, fragmentation, and whether the internet is moving toward a “splinternet”. The day concluded with a deep dive into post-quantum cryptography, where real-world implementations provided valuable lessons for securing the next era of communication systems.&lt;/p&gt;&lt;p&gt;The final day of the conference shifted attention to geopolitics, cyber resilience, and the role of standards in shaping strategic responses to global challenges. Speakers explored how critical infrastructure security is increasingly influenced by geopolitical dynamics and how coordinated international standards can help mitigate risks. The Cyber Resilience Act remained a focal point, with experts emphasising the urgency of developing the 19 associated ETSI standards to support implementation. Harmonising global labelling schemes based on ETSI EN 303 645 was identified as an immediate priority, while in the longer term, education—both for future generations and C-level executives—was seen as essential to strengthen awareness of how standards underpin sovereignty, innovation, and competitiveness.&lt;/p&gt;&lt;p&gt;The 2025 edition of the ETSI Security Conference reaffirmed ETSI’s position as a central hub for cybersecurity dialogue and collaboration. From 5G and IoT to post-quantum cryptography and 6G, it showcased how security is now integral to every layer of the digital ecosystem. As the journey toward IMT-2030 continues, the message from Sophia Antipolis was clear: proactive, standards-based collaboration is the foundation of a secure connected future.&lt;/p&gt;&lt;p&gt;You can see the detailed agenda &lt;a href=&quot;https://www.etsi.org/events/2481-etsi-security-conference-oct2025#pane-2/&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;. The presentations from the conference are all available &lt;a href=&quot;https://docbox.etsi.org/Workshop/2025/10_SECURITY_CONFERENCE&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Related Posts&lt;/b&gt;:&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2025/04/understanding-etsis-industry.html&quot;&gt;Understanding ETSI’s Industry Specification Groups (ISGs) and Why They Matter&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2023/11/etsi-security-conference-2023.html&quot;&gt;Presentations from ETSI Security Conference 2023&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;</description><link>https://blog.3g4g.co.uk/2025/10/evolving-communication-security-towards.html</link><author>noreply@blogger.com (Zahid Ghadialy)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYHLEQ2-rMgn3J0aRPIXlWK9ktnJoM1xroJsU2wQCQ_gAojqX7yb5rHeLJPQV_1C94HLP00mbZ5u9Y05mTBSZsPxYglaO5rGwx0UyeqmaRfCMryM2d1kuUIEzk0JsjxFXqXOt9iYdML7IZ7djR1Bjh4LdUugcr-r2SNOZV8RWkrAF7MTBJekkIHv8f_XE/s72-w640-h360-c/ETSISecurityConference2025.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1834236085756782640.post-4159108225177939641</guid><pubDate>Thu, 09 Oct 2025 06:35:00 +0000</pubDate><atom:updated>2025-10-09T07:35:00.120+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">3GPP</category><category domain="http://www.blogger.com/atom/ns#">5G</category><category domain="http://www.blogger.com/atom/ns#">5G-Advanced</category><category domain="http://www.blogger.com/atom/ns#">NTT DoCoMo</category><category domain="http://www.blogger.com/atom/ns#">Release 18</category><category domain="http://www.blogger.com/atom/ns#">Signalling</category><title>Seamless UE Context Recovery (SUECR) in 3GPP Release 18</title><description>&lt;p&gt;3GPP &lt;a href=&quot;https://blog.3g4g.co.uk/2024/08/3gpp-release-18-description-and-summary.html&quot; target=&quot;_blank&quot;&gt;Release 18&lt;/a&gt; introduces a wide range of enhancements across the 5G system, from energy efficiency and XR optimisation to AI-powered features. Among these developments is a practical but important addition known as Seamless User Equipment Context Recovery (SUECR), designed to handle situations where a device temporarily goes offline.&lt;/p&gt;&lt;p&gt;When a device such as a smartphone or IoT unit undergoes an operating system upgrade, a modem reset or a software update, it may become unavailable for a period of time. If this happens without informing the network, the operator’s core functions and connected application servers may continue to treat the device as available. This can result in wasted signalling, unnecessary retries and disruptions to critical operations that depend on the device’s availability.&lt;/p&gt;&lt;p&gt;SUECR provides a solution by allowing the device to notify the network of an unavailability period, which is a defined window of time during which it cannot communicate. Both the device and the core network retain important session and mobility information so that once the device returns, service can continue smoothly without unnecessary procedures.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiDc5buBfW7uQ5kx52j9vSiKRh65qqCHln9JpF0vHRup6u9Pmn-gZOqqqw4Zk86MmLe5LnWqC80XngtwMKHKTY1l_5BZn3QqY6SD4INSQ80sOqowjH4C085_jIslwm957U55M3Lzf7hMxHWIYHoGoSo76m_dCB_qWQJNGCknuhjkUdjliBzgmp8WKtcOwc/s1920/NTTDocomoTechnicalJournal_SUECR.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1080&quot; data-original-width=&quot;1920&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiDc5buBfW7uQ5kx52j9vSiKRh65qqCHln9JpF0vHRup6u9Pmn-gZOqqqw4Zk86MmLe5LnWqC80XngtwMKHKTY1l_5BZn3QqY6SD4INSQ80sOqowjH4C085_jIslwm957U55M3Lzf7hMxHWIYHoGoSo76m_dCB_qWQJNGCknuhjkUdjliBzgmp8WKtcOwc/w640-h360/NTTDocomoTechnicalJournal_SUECR.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;The feature works in two ways depending on the device’s ability to store context information. If the device can preserve its mobility and session management contexts in non-volatile memory or on the SIM, it executes a registration procedure before going offline. The unavailability period is included in this request, and the Access and Mobility Management Function (AMF) records the duration and recognises the device as unreachable until it re-registers. If an application function has subscribed to receive updates on device availability, the AMF also forwards this information so that application servers can adapt accordingly. If the device cannot save its context, it instead executes a deregistration procedure to notify the AMF of its unavailability, with similar treatment by the network until the device performs its next registration.&lt;/p&gt;&lt;p&gt;Once the update or reset is complete, the device re-registers with the network and resumes normal service. If the planned downtime is delayed, cancelled or extended, the device repeats the procedure to keep the network and applications accurately informed. This ensures that network functions and application servers no longer waste resources attempting to reach devices that are temporarily offline.&lt;/p&gt;&lt;p&gt;By introducing SUECR, Release 18 strengthens service reliability and efficiency. It prevents unnecessary signalling and enables critical applications to maintain accurate awareness of device availability. The figure above, from &lt;a href=&quot;https://www.docomo.ne.jp/english/corporate/technology/rd/technical_journal/bn/vol26_3/002.html&quot; target=&quot;_blank&quot;&gt;NTT Docomo’s Technical Journal&lt;/a&gt;, illustrates how the unavailability period is managed depending on whether the registration or deregistration procedure is used.&lt;/p&gt;&lt;p&gt;Seamless User Equipment Context Recovery may appear as a small enhancement in the context of all the new Rel-18 features, but it addresses an important gap in 5G operations. As networks continue to evolve towards automation and support for mission-critical services, this function will play a key role in making device management more predictable and dependable.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Related Posts&lt;/b&gt;:&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2024/08/3gpp-release-18-description-and-summary.html&quot;&gt;3GPP Release 18 Description and Summary of Work Items&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2025/08/understanding-l1l2-triggered-mobility.html&quot;&gt;Understanding L1/L2 Triggered Mobility (LTM) Procedure in 3GPP Release 18&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2025/05/3gpp-release-18-signal-level-enhanced.html&quot;&gt;3GPP Release 18 Signal level Enhanced Network Selection (SENSE) for Smarter Network Selection in Stationary IoT&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2024/11/low-latency-power-saving-with-low-power.html&quot;&gt;Low Latency Power Saving with Low Power-Wake Up Signal/Receiver (LP-WUS/LP-WUR)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2024/01/ue-assistance-information-in-lte-and-5g.html&quot;&gt;UE Assistance Information in LTE and 5G&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;</description><link>https://blog.3g4g.co.uk/2025/10/seamless-ue-context-recovery-suecr-in.html</link><author>noreply@blogger.com (Zahid Ghadialy)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiDc5buBfW7uQ5kx52j9vSiKRh65qqCHln9JpF0vHRup6u9Pmn-gZOqqqw4Zk86MmLe5LnWqC80XngtwMKHKTY1l_5BZn3QqY6SD4INSQ80sOqowjH4C085_jIslwm957U55M3Lzf7hMxHWIYHoGoSo76m_dCB_qWQJNGCknuhjkUdjliBzgmp8WKtcOwc/s72-w640-h360-c/NTTDocomoTechnicalJournal_SUECR.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1834236085756782640.post-1422689026496336359</guid><pubDate>Tue, 23 Sep 2025 06:35:00 +0000</pubDate><atom:updated>2025-09-23T12:58:02.856+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">5G</category><category domain="http://www.blogger.com/atom/ns#">5G-Advanced</category><category domain="http://www.blogger.com/atom/ns#">iPhone</category><category domain="http://www.blogger.com/atom/ns#">Japan</category><category domain="http://www.blogger.com/atom/ns#">KDDI</category><category domain="http://www.blogger.com/atom/ns#">Mobile Phones and Devices</category><category domain="http://www.blogger.com/atom/ns#">NTT DoCoMo</category><category domain="http://www.blogger.com/atom/ns#">Samsung</category><category domain="http://www.blogger.com/atom/ns#">Swisscom</category><title>5G+ and 5GA Icon (Pictogram) in New Smartphones</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjqb9JJpcmtFrGSOSeySlQe8QJrOIGPGJ0GVsAqH7xPYKNUUZgNo-CtKZtcpGutG9cwk7QL3CJWt0yRplSy5Se60HbI7GvOKXmRJORMHonPot81igv5W3ZmN57umTQAg5brpRbytY-5ouWJdlsv-sWFxkA1cUWeAJrgQEyAM8ACIc0OySv2MotopVCT1xA/s1920/5G_5G+_Icon_Pictogram_Update_2025.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1080&quot; data-original-width=&quot;1920&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjqb9JJpcmtFrGSOSeySlQe8QJrOIGPGJ0GVsAqH7xPYKNUUZgNo-CtKZtcpGutG9cwk7QL3CJWt0yRplSy5Se60HbI7GvOKXmRJORMHonPot81igv5W3ZmN57umTQAg5brpRbytY-5ouWJdlsv-sWFxkA1cUWeAJrgQEyAM8ACIc0OySv2MotopVCT1xA/w640-h360/5G_5G+_Icon_Pictogram_Update_2025.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;As 5G matures, new icons are appearing on smartphones to distinguish faster or more advanced connections. Some of the latest 5G smartphones around the world have started showing new icons such as 5G+ and 5GA. Interestingly, in Japan these are referred to as &lt;i&gt;pictograms&lt;/i&gt;.&lt;/p&gt;&lt;p&gt;A long time ago, &lt;a href=&quot;https://www.operatorwatch.com/2019/05/swisscom-launched-5g-fast-and-5g-wide_84.html&quot; target=&quot;_blank&quot;&gt;we looked at&lt;/a&gt; how Swisscom described its 5G rollout as 5G-wide and 5G-fast. Today, Swisscom uses the 5G+ icon to represent what it previously called 5G-fast. In its &lt;a href=&quot;https://reports.swisscom.ch/download/2024/en/swisscom_geschaeftsbericht_gesamt_2024_en.pdf&quot; target=&quot;_blank&quot;&gt;annual report&lt;/a&gt;, Swisscom explained:&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;color: #0b5394;&quot;&gt;5G (and 5G+) is the latest generation of mobile technology. Compared to 3G and 4G, it provides even more capacity, very short response times, and higher bandwidths. 5G technology plays a major role in supporting the digitalisation of the Swiss economy and industry. Swisscom differentiates between 5G-fast (narrower coverage up to 2 Gbit/s and more) and 5G-wide (Switzerland-wide 5G coverage with up to 1 Gbit/s). 5G-fast is also known as 5G+. Both variants are more efficient than their predecessor technologies with respect to energy consumption and use of electromagnetic fields.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Japan has only recently transitioned to using 5G+. A &lt;a href=&quot;https://www.docomo.ne.jp/area/technology/5g/notice.html&quot; target=&quot;_blank&quot;&gt;Google-translated page&lt;/a&gt; from NTT Docomo explains it as follows:&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;color: #990000;&quot;&gt;In areas where 5G communication is possible, the RAT display on standby will be &quot;5G.&quot; On the other hand, during communication, the RAT display will be &quot;5G+&quot; for 5G communication using wideband 5G frequencies (3.7 GHz, 4.5 GHz, 28 GHz), &quot;5G&quot; for 5G communication using 4G frequencies, and &quot;4G+&quot; for LTE communication.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;There are also footnotes clarifying that the display depends on the device, the bands supported, and the area of use.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;blockquote class=&quot;twitter-tweet&quot;&gt;&lt;p dir=&quot;ltr&quot; lang=&quot;ja&quot;&gt;お、新しいiPhone&lt;br /&gt;auだと5G+ピクトとHPUE対応か&lt;br /&gt;いいぞ &lt;a href=&quot;https://t.co/U0J7FWlo1w&quot;&gt;pic.twitter.com/U0J7FWlo1w&lt;/a&gt;&lt;/p&gt;— 電波やくざ (@denpa893) &lt;a href=&quot;https://twitter.com/denpa893/status/1968859325255868913?ref_src=twsrc%5Etfw&quot;&gt;September 19, 2025&lt;/a&gt;&lt;/blockquote&gt; &lt;script async=&quot;&quot; charset=&quot;utf-8&quot; src=&quot;https://platform.twitter.com/widgets.js&quot;&gt;&lt;/script&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;From this, my understanding is that in newer devices the 5G+ icon is primarily used to indicate speed and capability, regardless of whether the connection is Standalone (SA) or Non-Standalone (NSA) 5G. KDDI is following the same approach, as explained on its own &lt;a href=&quot;https://newsroom.kddi.com/news/detail/kddi_nr-531_3809.html&quot; target=&quot;_blank&quot;&gt;support pages&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;blockquote class=&quot;twitter-tweet&quot;&gt;&lt;p dir=&quot;ltr&quot; lang=&quot;en&quot;&gt;A good summary of 5G icons from latest Apple iPhone in Mobile &amp;amp; Wireless Roundup Newsletter from yesterday &lt;a href=&quot;https://t.co/4yuHzHsRln&quot;&gt;https://t.co/4yuHzHsRln&lt;/a&gt;&lt;a href=&quot;https://twitter.com/hashtag/Free5Gtraining?src=hash&amp;amp;ref_src=twsrc%5Etfw&quot;&gt;#Free5Gtraining&lt;/a&gt; &lt;a href=&quot;https://twitter.com/hashtag/3G4G5G?src=hash&amp;amp;ref_src=twsrc%5Etfw&quot;&gt;#3G4G5G&lt;/a&gt; &lt;a href=&quot;https://twitter.com/hashtag/5G?src=hash&amp;amp;ref_src=twsrc%5Etfw&quot;&gt;#5G&lt;/a&gt; &lt;a href=&quot;https://twitter.com/hashtag/5Gtechnology?src=hash&amp;amp;ref_src=twsrc%5Etfw&quot;&gt;#5Gtechnology&lt;/a&gt; &lt;a href=&quot;https://twitter.com/hashtag/5Gdevices?src=hash&amp;amp;ref_src=twsrc%5Etfw&quot;&gt;#5Gdevices&lt;/a&gt; &lt;a href=&quot;https://twitter.com/hashtag/Smartphones?src=hash&amp;amp;ref_src=twsrc%5Etfw&quot;&gt;#Smartphones&lt;/a&gt; &lt;a href=&quot;https://twitter.com/hashtag/iPhone?src=hash&amp;amp;ref_src=twsrc%5Etfw&quot;&gt;#iPhone&lt;/a&gt; &lt;a href=&quot;https://twitter.com/hashtag/iOS18?src=hash&amp;amp;ref_src=twsrc%5Etfw&quot;&gt;#iOS18&lt;/a&gt; &lt;a href=&quot;https://twitter.com/hashtag/5Gicons?src=hash&amp;amp;ref_src=twsrc%5Etfw&quot;&gt;#5Gicons&lt;/a&gt; &lt;a href=&quot;https://twitter.com/hashtag/USA?src=hash&amp;amp;ref_src=twsrc%5Etfw&quot;&gt;#USA&lt;/a&gt; &lt;a href=&quot;https://twitter.com/hashtag/ATT?src=hash&amp;amp;ref_src=twsrc%5Etfw&quot;&gt;#ATT&lt;/a&gt; &lt;a href=&quot;https://twitter.com/hashtag/Tmobile?src=hash&amp;amp;ref_src=twsrc%5Etfw&quot;&gt;#Tmobile&lt;/a&gt; &lt;a href=&quot;https://twitter.com/hashtag/Verizon?src=hash&amp;amp;ref_src=twsrc%5Etfw&quot;&gt;#Verizon&lt;/a&gt; &lt;a href=&quot;https://twitter.com/hashtag/VZW?src=hash&amp;amp;ref_src=twsrc%5Etfw&quot;&gt;#VZW&lt;/a&gt; &lt;a href=&quot;https://t.co/YOq7Pv42ZS&quot;&gt;pic.twitter.com/YOq7Pv42ZS&lt;/a&gt;&lt;/p&gt;— Free 5G Training (@5Gtraining) &lt;a href=&quot;https://twitter.com/5Gtraining/status/1840743374938096032?ref_src=twsrc%5Etfw&quot;&gt;September 30, 2024&lt;/a&gt;&lt;/blockquote&gt; &lt;script async=&quot;&quot; charset=&quot;utf-8&quot; src=&quot;https://platform.twitter.com/widgets.js&quot;&gt;&lt;/script&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Last year we &lt;a href=&quot;https://www.linkedin.com/posts/free-5g-training_free5gtraining-3g4g5g-5g-activity-7246509381930876928-faep/&quot; target=&quot;_blank&quot;&gt;looked at&lt;/a&gt; what iPhone icons meant. In iOS 18, 5G+ indicated that the phone was connected to mmWave. In iOS 19 this hasn’t really changed, although I have been told that it depends on the operator whether they choose to display 5G+ when the device is camped on higher-speed mid-band 5G.&lt;/p&gt;&lt;p&gt;Samsung Galaxy smartphones &lt;a href=&quot;https://www.reddit.com/r/GalaxyFold/comments/yj5yxs/what_is_the_difference_between_these_5g_icons/&quot; target=&quot;_blank&quot;&gt;display&lt;/a&gt; two or three types of icons, as shown in the picture at the top. While the meanings are not entirely clear, Samsung’s &lt;a href=&quot;https://downloadcenter.samsung.com/content/UM/202506/20250616195052339/S91X_S90X_G99X_UG_CA_15_ENG_D3.pdf&quot; target=&quot;_blank&quot;&gt;user guide for Android 15&lt;/a&gt; explains them as:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Filled square&lt;/b&gt;: “&lt;span style=&quot;color: #134f5c;&quot;&gt;5G network connected&lt;/span&gt;”, which I interpret as being connected to a 5G Standalone network.&lt;/li&gt;&lt;li&gt;&lt;b&gt;Transparent or outlined square&lt;/b&gt;: “&lt;span style=&quot;color: #134f5c;&quot;&gt;LTE network connected in LTE network that includes the 5G network.&lt;/span&gt;”, which I interpret as 5G NSA.&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;li&gt;I did not find a reference to the unboxed 5G icon in this manual.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Finally, the &lt;a href=&quot;https://www.reddit.com/r/OnePlus13/comments/1lgshww/what_is_this_new_5ga/&quot; target=&quot;_blank&quot;&gt;OnePlus 13 in India&lt;/a&gt; has started displaying the &lt;b&gt;5GA&lt;/b&gt; icon. Since Jio only operates a 5G Standalone network, it is possible they have upgraded the network and device to use the Release 18 ASN with some new features. This allows them to market it as 5G-Advanced, thereby justifying the 5GA icon.&lt;/p&gt;&lt;p&gt;If you have noticed something different in your country or region, or have another interpretation, I would love to hear more.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Related Posts:&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2019/02/displaying-5g-network-status-icon-on.html&quot;&gt;Displaying 5G Network Status Icon on Smartphones and Other Devices&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2019/09/when-does-your-5g-nsa-device-show-5g.html&quot;&gt;When does your 5G NSA Device Show 5G Icon?&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Operator Watch Blog: &lt;a href=&quot;https://www.operatorwatch.com/2019/05/swisscom-launched-5g-fast-and-5g-wide_84.html&quot;&gt;Swisscom launched 5G Fast and 5G Wide&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;</description><link>https://blog.3g4g.co.uk/2025/09/5g-and-5ga-icon-pictogram-in-new.html</link><author>noreply@blogger.com (Zahid Ghadialy)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjqb9JJpcmtFrGSOSeySlQe8QJrOIGPGJ0GVsAqH7xPYKNUUZgNo-CtKZtcpGutG9cwk7QL3CJWt0yRplSy5Se60HbI7GvOKXmRJORMHonPot81igv5W3ZmN57umTQAg5brpRbytY-5ouWJdlsv-sWFxkA1cUWeAJrgQEyAM8ACIc0OySv2MotopVCT1xA/s72-w640-h360-c/5G_5G+_Icon_Pictogram_Update_2025.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1834236085756782640.post-1385576912978164678</guid><pubDate>Thu, 11 Sep 2025 06:35:00 +0000</pubDate><atom:updated>2025-09-11T07:53:52.265+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Rohde and Schwarz</category><category domain="http://www.blogger.com/atom/ns#">Spectrum</category><category domain="http://www.blogger.com/atom/ns#">Testing</category><category domain="http://www.blogger.com/atom/ns#">Tutorials</category><category domain="http://www.blogger.com/atom/ns#">Videos</category><title>Dummy Loads in RF Testing for Dummies</title><description>&lt;p&gt;I have spent many years working in the Test and Measurement industry and have also worked as a hands on engineer testing solutions, and as a field engineer testing various solution pre and post deployment. Over the years I have used various attenuators and dummy loads. It was nice to finally look at the different types of dummy loads and understand how they work in this R&amp;amp;S video.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4laLoeE50WHZIxeTuUWqsxRzp_dWpzeVCdxFBnrbHFs_axjuQhx5xZmgdZz5IJ5YRxde0z3OUQqBZBv1t0_zQAUayLRdJAv6sjDK48Nb1taQMdSaSRVwwi-kTf9omGcXaH2iQo4Uwl7ZkYCT_03Gs_OnhQb1eUy7I4cw4vw6dcPhkgHcsV1b7WiuQ1co/s1920/RohdeSchwarzDummyLoadsExplainer.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1080&quot; data-original-width=&quot;1920&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4laLoeE50WHZIxeTuUWqsxRzp_dWpzeVCdxFBnrbHFs_axjuQhx5xZmgdZz5IJ5YRxde0z3OUQqBZBv1t0_zQAUayLRdJAv6sjDK48Nb1taQMdSaSRVwwi-kTf9omGcXaH2iQo4Uwl7ZkYCT_03Gs_OnhQb1eUy7I4cw4vw6dcPhkgHcsV1b7WiuQ1co/w640-h360/RohdeSchwarzDummyLoadsExplainer.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;So what exactly is a dummy load? At its core, it is a special kind of termination designed to absorb radio frequency energy safely. Instead of letting signals radiate into the air, a dummy load converts the RF power into heat. Think of it as an antenna that never actually transmits anything. This makes it invaluable when testing transmitters because you can run them at full power without interfering with anyone else’s spectrum.&lt;/p&gt;&lt;p&gt;Ordinary terminations are widely used in test setups but they are usually only good for low power. If you need to deal with more than about a watt of power, that is where dummy loads come in. Depending on their design, they can handle anything from a few watts to many kilowatts. To survive this, dummy loads use cooling methods. The most common are dry loads with large heatsinks that shed heat into the air. For higher powers, wet loads use liquids such as water or oil to absorb and move heat away more efficiently. Some combine both air and liquid cooling to push the limits even further.&lt;/p&gt;&lt;p&gt;Good dummy loads are not just about heat management. They also need to provide a stable impedance match, usually 50 ohms, across a wide frequency range. This minimises reflections and ensures accurate testing. Many dummy loads cover frequencies up to several gigahertz with low standing wave ratios. Ultra broadband designs, such as the &lt;a href=&quot;https://scdn.rohde-schwarz.com/ur/pws/dl_downloads/dl_common_library/dl_brochures_and_datasheets/pdf_1/Attenuators_pro-fly_en_0758-1906_32_v1000.pdf&quot; target=&quot;_blank&quot;&gt;Rohde &amp;amp; Schwarz UBL100&lt;/a&gt;, go up to 18 GHz and can safely absorb power levels in the kilowatt range&lt;/p&gt;&lt;p&gt;Some dummy loads even add extra features. A sampling port allows you to monitor the input signal at a reduced level. Interlock protection can shut down a connected transmitter if the load gets too hot. These touches make dummy loads more versatile and safer in real-world use.&lt;/p&gt;&lt;p&gt;In day-to-day testing, dummy loads help not only to protect transmitters but also to get accurate measurements. By acting as a perfectly matched, non-radiating antenna, they give engineers confidence that they are measuring the true transmitter output. They can also be used to quickly check feedlines and connectors by substituting them in place of an antenna.&lt;/p&gt;&lt;p&gt;Rohde &amp;amp; Schwarz have put together a useful explainer video that covers all of this in a simple, visual way. You can watch it below to get a clear overview of dummy loads and why they matter so much in RF testing.&lt;/p&gt;&lt;p&gt;&lt;iframe allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;315&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; src=&quot;https://www.youtube.com/embed/UY83eIyB9Zc?si=Hj6A6MBr-JiEV2AG&quot; title=&quot;YouTube video player&quot; width=&quot;560&quot;&gt;&lt;/iframe&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;Related Posts&lt;/b&gt;:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2023/05/new-5g-ntn-spectrum-bands-in-fr1-and-fr2.html&quot;&gt;New 5G NTN Spectrum Bands in FR1 and FR2&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Free 6G Training: &lt;a href=&quot;https://www.free6gtraining.com/2022/09/non-terrestrial-networks-ntn-satellites.html&quot;&gt;Non-Terrestrial Networks (NTN) &amp;amp; Satellites - Taking 6G to the Stars&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2020/10/positioning-techniques-for-5g-nr-in.html&quot;&gt;Positioning Techniques for 5G NR in 3GPP Release-16&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Free 6G Training: &lt;a href=&quot;https://www.free6gtraining.com/2020/11/spectrum-for-5g-beyond-5g-and-6g.html&quot;&gt;Spectrum for 5G, Beyond 5G and 6G research&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2020/07/key-technology-aspects-of-5g-security.html&quot;&gt;Key Technology Aspects of 5G Security by Rohde &amp;amp; Schwarz&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2019/10/r-webinar-on-lte-pro-and-evolution-to-5g.html&quot;&gt;R&amp;amp;S Webinar on LTE-A Pro and evolution to 5G&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;</description><link>https://blog.3g4g.co.uk/2025/09/dummy-loads-in-rf-testing-for-dummies.html</link><author>noreply@blogger.com (Zahid Ghadialy)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4laLoeE50WHZIxeTuUWqsxRzp_dWpzeVCdxFBnrbHFs_axjuQhx5xZmgdZz5IJ5YRxde0z3OUQqBZBv1t0_zQAUayLRdJAv6sjDK48Nb1taQMdSaSRVwwi-kTf9omGcXaH2iQo4Uwl7ZkYCT_03Gs_OnhQb1eUy7I4cw4vw6dcPhkgHcsV1b7WiuQ1co/s72-w640-h360-c/RohdeSchwarzDummyLoadsExplainer.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1834236085756782640.post-4071529174908982069</guid><pubDate>Mon, 01 Sep 2025 06:35:00 +0000</pubDate><atom:updated>2025-09-23T08:35:15.408+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Datacentre</category><category domain="http://www.blogger.com/atom/ns#">Energy Consumption and Savings</category><category domain="http://www.blogger.com/atom/ns#">Environment and Green Issues</category><category domain="http://www.blogger.com/atom/ns#">Tech Laws</category><category domain="http://www.blogger.com/atom/ns#">Tutorials</category><category domain="http://www.blogger.com/atom/ns#">Videos</category><title>Software Efficiency Matters as Much as Hardware for Sustainability</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjNGtPWSgimowGz-xjbW5KSp1Hjk5yFdwwOPeQuqcO0m2bC5iMiqzByBugEdugLcfqIqDlBhs0zo1rTBHieK50OE3uVOQpODKM6qej2Hqh4b9EOuaRJWCwXyYo_AZrk3hOCwSTiaxf6MQnR5ISkM6V8-sVR1CnwHBuoo-nH46c3D9CnQuhKJeM_NSaoMCw/s1920/BertHubert_SaveTheWorld_WriteMoreEfficientCode.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1080&quot; data-original-width=&quot;1920&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjNGtPWSgimowGz-xjbW5KSp1Hjk5yFdwwOPeQuqcO0m2bC5iMiqzByBugEdugLcfqIqDlBhs0zo1rTBHieK50OE3uVOQpODKM6qej2Hqh4b9EOuaRJWCwXyYo_AZrk3hOCwSTiaxf6MQnR5ISkM6V8-sVR1CnwHBuoo-nH46c3D9CnQuhKJeM_NSaoMCw/w640-h360/BertHubert_SaveTheWorld_WriteMoreEfficientCode.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;When we talk about making computing greener, the conversation often turns to hardware. Data centres have become far more efficient over the years. Power supply units that once wasted 40% of energy now operate above 90% efficiency. Cooling systems that once consumed several times the power of the servers themselves have been dramatically improved. The hardware people have delivered.&lt;/p&gt;&lt;p&gt;But as Bert Hubert argues in his talk “Save the world, write more efficient code”, software has been quietly undoing many of those gains. Software bloat has outpaced hardware improvements. What once required careful optimisation is now often solved by throwing more cloud resources at the problem. That keeps systems running, but at a significant energy cost.&lt;/p&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;The hidden footprint of sluggish software&lt;/h4&gt;&lt;p&gt;Sluggish systems are not just an annoyance. Every loading spinner, every second a user waits, often means CPUs are running flat out somewhere in the chain. At scale, those wasted cycles add up to megawatthours of electricity. Studies suggest that servers are responsible for around 4% of global CO₂ emissions, on par with the entire aviation industry. That is not a small share, and it makes efficient software a climate issue.&lt;/p&gt;&lt;p&gt;Hubert points out that the difference between badlly written code, reasonable code, and highly optimised code can easily span a factor of 100 in computing requirements. He demonstrates this with a simple example: generating a histogram of Dutch house numbers from a dataset of 9.9 million addresses.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;A naïve Python implementation took 12 seconds and consumed over 500 joules of energy per run.&lt;/li&gt;&lt;li&gt;A straightforward database query reduced this to around 20 joules.&lt;/li&gt;&lt;li&gt;Using DuckDB, a database optimised for analytics, the same task dropped to just 2.5 joules and completed in milliseconds.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The user experience also improved dramatically. What once required a long wait became effectively instantaneous.&lt;/p&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;From data centres to “data sheds”&lt;/h4&gt;&lt;p&gt;The point is not just academic. If everyone aimed for higher software efficiency, Hubert suggests, many data centres could be shrunk to the size of a shed. Unlike hardware, where efficiency can be bought, software efficiency has to be designed and built. It requires time, effort and, crucially, management permission to prioritise performance over simply shipping features.&lt;/p&gt;&lt;p&gt;Netflix provides a striking example. Its custom Open Connect appliances deliver around 45,000 video streams at under 10 milliwatts per user. By investing heavily in efficiency, they proved that optimised software and hardware together can deliver enormous gains.&lt;/p&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;The cloud and client-side challenge&lt;/h4&gt;&lt;p&gt;The shift to the cloud has created perverse incentives. In the past, if your code was inefficient, the servers would crash and force a rewrite. Now, organisations can simply spin up more cloud instances. That makes it too easy to ignore software waste and too tempting to pass the costs into ever-growing cloud bills. Those costs are not only financial, but also environmental.&lt;/p&gt;&lt;p&gt;On the client side, the problem is subtler but still real. While loading sluggish web apps may not burn as much power as a data centre, the sheer number of devices adds up. Hubert measured that opening LinkedIn on a desktop consumed around 45 joules. Scaled to hundreds of millions of users, even modest inefficiencies start to look like power plants.&lt;/p&gt;&lt;p&gt;Sometimes the situation is worse. Hubert found that simply leaving open.spotify.com running in a browser kept his machine burning an additional 45 watts continuously, due to a rogue worker thread. With hundreds of millions of users, that single design choice could represent hundreds of megawatts of wasted power globally.&lt;/p&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;Building greener software&lt;/h4&gt;&lt;p&gt;The lesson is clear. Early sluggishness never goes away. If a system is slow with only a handful of users, it will be catastrophically wasteful at scale. The time to demand efficiency is at the start of a project.&lt;/p&gt;&lt;p&gt;There are also practical steps engineers and organisations can take:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Measure energy use during development, not just performance.&lt;/li&gt;&lt;li&gt;Audit client-side behaviour for long-lived applications.&lt;/li&gt;&lt;li&gt;Incentivise teams to improve efficiency, not just to ship quickly.&lt;/li&gt;&lt;li&gt;Treat large cloud bills as a proxy for emissions as well as costs.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;As Hubert says, we may only be able to influence 4% of global energy use through software. But that is the same impact as the aviation industry. Hardware engineers have done their part. Now it is time for software engineers to step up.&lt;/p&gt;&lt;p&gt;You can watch Bert Hubert’s full talk below, where he shares both entertaining stories and sobering measurements that show why greener software is not only possible but urgently needed. The PDF of slides is &lt;a href=&quot;https://berthub.eu/joc/with-notes.pdf&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;&amp;nbsp;and his LinkedIn discussion &lt;a href=&quot;https://www.linkedin.com/posts/bert-hubert-b05452_last-week-i-presented-over-at-joy-of-coding-activity-7345926351108947968-KERN/&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;&lt;iframe allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;315&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; src=&quot;https://www.youtube.com/embed/XntLynSlYjI?si=qylosu6gEKG-YQe-&quot; title=&quot;YouTube video player&quot; width=&quot;560&quot;&gt;&lt;/iframe&gt;&lt;/p&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;Related Posts:&lt;/h4&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;The 3G4G Blog - &lt;a href=&quot;https://blog.3g4g.co.uk/2023/04/etsis-summit-on-sustainability-ict.html&quot;&gt;ETSI&#39;s Summit on Sustainability: ICT Standards for a Greener World&lt;/a&gt;&lt;/li&gt;&lt;li&gt;3G4G: &lt;a href=&quot;https://www.3g4g.co.uk/TechKnowledge/&quot;&gt;TechKnowledge Technology Stories&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2012/07/tech-laws-we-should-all-know-about.html&quot;&gt;Tech Laws we should all know about - #TechLaws&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;</description><link>https://blog.3g4g.co.uk/2025/09/software-efficiency-matters-as-much-as.html</link><author>noreply@blogger.com (Zahid Ghadialy)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjNGtPWSgimowGz-xjbW5KSp1Hjk5yFdwwOPeQuqcO0m2bC5iMiqzByBugEdugLcfqIqDlBhs0zo1rTBHieK50OE3uVOQpODKM6qej2Hqh4b9EOuaRJWCwXyYo_AZrk3hOCwSTiaxf6MQnR5ISkM6V8-sVR1CnwHBuoo-nH46c3D9CnQuhKJeM_NSaoMCw/s72-w640-h360-c/BertHubert_SaveTheWorld_WriteMoreEfficientCode.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1834236085756782640.post-5622826886789002608</guid><pubDate>Thu, 21 Aug 2025 06:35:00 +0000</pubDate><atom:updated>2025-08-21T08:14:01.648+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">3GPP</category><category domain="http://www.blogger.com/atom/ns#">5G</category><category domain="http://www.blogger.com/atom/ns#">5G-Advanced</category><category domain="http://www.blogger.com/atom/ns#">Ericsson</category><category domain="http://www.blogger.com/atom/ns#">Handovers</category><category domain="http://www.blogger.com/atom/ns#">intra-gNB Handover</category><category domain="http://www.blogger.com/atom/ns#">MediaTek</category><category domain="http://www.blogger.com/atom/ns#">Release 18</category><category domain="http://www.blogger.com/atom/ns#">Signalling</category><title>Understanding L1/L2 Triggered Mobility (LTM) Procedure in 3GPP Release 18</title><description>&lt;p&gt;In an earlier post we looked at the &lt;a href=&quot;https://blog.3g4g.co.uk/2024/08/3gpp-release-18-description-and-summary.html&quot; target=&quot;_blank&quot;&gt;3GPP Release 18 Description and Summary of Work Items&lt;/a&gt;. One of the key areas was Further NR mobility enhancements, where a new feature called L1/L2-triggered mobility (LTM) has been introduced. This procedure aims to reduce mobility latency and improve handover performance in 5G-Advanced.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgEfr-fDwkVzC9DltXI2UQvdseT4CJUl2Bn0qTgkpP_yJaz2EjsQYiyArL5NhhNwOSGz4drTAtcH8WFNwH28rLoCsfdTS8iWatriJEBe185_c452h5MMtDT2VNAI8OdamgiWDY3xDwT74bfH_llOakFIDcNhPJdoHlWpMRHjHLRZe_695Cs2L6PmMrA26w/s1920/Ericsson_LTMProcedure_3GPP_Release18.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1080&quot; data-original-width=&quot;1920&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgEfr-fDwkVzC9DltXI2UQvdseT4CJUl2Bn0qTgkpP_yJaz2EjsQYiyArL5NhhNwOSGz4drTAtcH8WFNwH28rLoCsfdTS8iWatriJEBe185_c452h5MMtDT2VNAI8OdamgiWDY3xDwT74bfH_llOakFIDcNhPJdoHlWpMRHjHLRZe_695Cs2L6PmMrA26w/w640-h360/Ericsson_LTMProcedure_3GPP_Release18.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Mobility has always been one of the most important areas in cellular networks. The ability of a user equipment (UE) to move between cells without losing service is essential for reliability and performance. Traditional handover procedures in 4G and 5G rely on Layer 3 (L3) signalling, which is robust but can result in high signalling overhead and connection interruption times of 50 to 90 milliseconds. While most consumer services can tolerate this, advanced use cases with strict latency demands cannot.&lt;/p&gt;&lt;p&gt;3GPP Release 18 takes a significant step forward by introducing the &lt;a href=&quot;https://www.ericsson.com/en/blog/2024/8/5g-advanced-handover-triggered-mobility&quot; target=&quot;_blank&quot;&gt;L1/L2 Triggered Mobility (LTM)&lt;/a&gt; procedure. Instead of relying only on L3 signalling, LTM shifts much of the handover process down to Layer 1 (physical) and Layer 2 (MAC), making it both faster and more efficient. The goal is to reduce interruption to around 20 to 30 milliseconds, a level that can better support applications in ultra-reliable low latency communication, extended reality and mobility automation.&lt;/p&gt;&lt;p&gt;The principle behind LTM is straightforward. The UE is preconfigured with candidate target cells by the network. These configurations can be provided in two ways: either as a common reference with small delta updates for each candidate or as complete configurations. Keeping the configuration of multiple candidates allows the UE to switch more quickly without requiring another round of reconfiguration after each move.&lt;/p&gt;&lt;p&gt;Measurements are then performed at lower layers. The UE reports reference signal measurements and time and phase information to the network. Medium Access Control (MAC) control elements are used to activate or deactivate target cell states, including transmission configuration indicator (TCI) states. This ensures the UE is already aware of beam directions and reference signals in the target cells before the actual switch.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHT16JmSDnfqXw13XQKAp-QB31e39zkUwVhJnoYr5zSf36e_bOZsypL5zVEIQo_2M3EvniNn4p8RU-R-dfgOfbUOhyphenhyphen5ko2aIsSF2PKsuWAQs1A9u18OJGmcDvDOOtVaW9kEKBU-r9_mEhvT4vpjtJlZM-8y1WaIIlH6NtADBnV7iG-XMHClpEFCwVUAD0/s1920/Ericsson_LTMProcedure_3GPP_Release18_2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1080&quot; data-original-width=&quot;1920&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHT16JmSDnfqXw13XQKAp-QB31e39zkUwVhJnoYr5zSf36e_bOZsypL5zVEIQo_2M3EvniNn4p8RU-R-dfgOfbUOhyphenhyphen5ko2aIsSF2PKsuWAQs1A9u18OJGmcDvDOOtVaW9kEKBU-r9_mEhvT4vpjtJlZM-8y1WaIIlH6NtADBnV7iG-XMHClpEFCwVUAD0/w640-h360/Ericsson_LTMProcedure_3GPP_Release18_2.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;A particularly important innovation in LTM is the concept of pre-synchronisation. Both downlink and uplink pre-synchronisation can take place while the UE is still connected to the serving cell. For downlink, the network instructs the UE to align with a candidate cell’s beams. For uplink, the UE can transmit a random-access preamble towards a target cell, and the network calculates a timing advance (TA) value. This TA is stored and delivered only at the moment of execution, allowing the UE to avoid a new random access procedure. In cases where TA is already known or equal to the serving cell, the handover becomes RACH-less, eliminating a significant source of delay.&lt;/p&gt;&lt;p&gt;The final step is the LTM cell switch command. This MAC control element carries the chosen target configuration, TA value and TCI state indication. Since synchronisation has already been achieved, the UE can break the old connection and resume data transfer almost immediately in the new cell.&lt;/p&gt;&lt;p&gt;Compared to earlier attempts such as Dual Active Protocol Stack (DAPS) handover, which required maintaining two simultaneous connections and faced practical limitations, LTM offers a more scalable solution. It can be applied across frequency ranges, including higher bands above 7 GHz where beamforming is critical, and it works for both intra-DU and inter-DU mobility within a gNB.&lt;/p&gt;&lt;p&gt;The Release 18 specification restricts LTM to intra-gNB mobility, but work has already begun in Release 19 to expand it further. Future enhancements are expected to cover inter-gNB mobility and to refine measurement reporting for even greater efficiency.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgMZl16FhPUtcjMTabZRurphWBb8StSEDn2eB32W4NTeMMHp48JOIOioMCDfCF5b8-MOB7LCYApThYZPKEQKHoA1htZCY8rJMbw996M_kas3xqmv3zBpsjfb6fKuqq0rAp2D6AwE1iW824YQ5EmUIfWZGXydl8w5uWGfdhTlnr0DSmt96AAc2aUja6hbs/s1920/MediaTek_B6GS2024_ComputeAndStorage_Mobility.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1080&quot; data-original-width=&quot;1920&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgMZl16FhPUtcjMTabZRurphWBb8StSEDn2eB32W4NTeMMHp48JOIOioMCDfCF5b8-MOB7LCYApThYZPKEQKHoA1htZCY8rJMbw996M_kas3xqmv3zBpsjfb6fKuqq0rAp2D6AwE1iW824YQ5EmUIfWZGXydl8w5uWGfdhTlnr0DSmt96AAc2aUja6hbs/w640-h360/MediaTek_B6GS2024_ComputeAndStorage_Mobility.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Looking beyond 5G Advanced, new concepts are being explored for 6G. At the &lt;a href=&quot;https://www.free6gtraining.com/2025/02/mediateks-view-on-enabling-healthy-and.html&quot; target=&quot;_blank&quot;&gt;Brooklyn 6G Summit&lt;/a&gt; 2024, MediaTek introduced the idea of L1/L2 Triggered Predictive Mobility (LTPM), where predictive intelligence could play a role in mobility decisions. While this is still at an early research stage, it points to how mobility management will continue to evolve.&lt;/p&gt;&lt;p&gt;For now, the introduction of LTM marks a practical and important milestone. By reducing handover latency significantly, it brings the network closer to meeting the demanding requirements of next generation services while maintaining efficiency in signalling and resource use.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Related Posts&lt;/b&gt;:&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2024/08/3gpp-release-18-description-and-summary.html&quot;&gt;3GPP Release 18 Description and Summary of Work Items&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Free 6G Training: &lt;a href=&quot;https://www.free6gtraining.com/2025/02/mediateks-view-on-enabling-healthy-and.html&quot;&gt;MediaTek’s View on Enabling a Healthy and User-Centric 6G Device Ecosystem&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2020/10/understanding-daps-handover.html&quot;&gt;Understanding the Dual Active Protocol Stack (DAPS) Handover in 5G&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2022/08/dcca-features-and-enhancements-in-5g.html&quot;&gt;DCCA Features and Enhancements in 5G New Radio&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;</description><link>https://blog.3g4g.co.uk/2025/08/understanding-l1l2-triggered-mobility.html</link><author>noreply@blogger.com (Zahid Ghadialy)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgEfr-fDwkVzC9DltXI2UQvdseT4CJUl2Bn0qTgkpP_yJaz2EjsQYiyArL5NhhNwOSGz4drTAtcH8WFNwH28rLoCsfdTS8iWatriJEBe185_c452h5MMtDT2VNAI8OdamgiWDY3xDwT74bfH_llOakFIDcNhPJdoHlWpMRHjHLRZe_695Cs2L6PmMrA26w/s72-w640-h360-c/Ericsson_LTMProcedure_3GPP_Release18.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1834236085756782640.post-3617630766243726099</guid><pubDate>Fri, 08 Aug 2025 06:35:00 +0000</pubDate><atom:updated>2025-08-08T09:14:36.256+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">3GPP</category><category domain="http://www.blogger.com/atom/ns#">5G</category><category domain="http://www.blogger.com/atom/ns#">6G</category><category domain="http://www.blogger.com/atom/ns#">Antennas</category><category domain="http://www.blogger.com/atom/ns#">Cambridge Wireless (CW)</category><category domain="http://www.blogger.com/atom/ns#">GSM</category><category domain="http://www.blogger.com/atom/ns#">Mobile Phones and Devices</category><category domain="http://www.blogger.com/atom/ns#">Standards</category><title>Is 6G Our Last Chance to Make Antennas Great Again?</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgF7NrOfx2Ijubnwzsp5SA40HMMB5a37yWT49K-2d2OCQhwSAXnATBF2XE0seW1HfMpdGi89JLrhBqOP1FYcIgQVfXq7YFbAuv_fU9vAq6fzQfM0C8BCMN1gQetw2koE1R5PsVq72UjZ2FajAJ5GZ8L4r0wGG9ifsyLVDyAZ6O23BUJuqFczW4rwUfMqvY/s1920/MakeAntennasGreatAgain_1.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1080&quot; data-original-width=&quot;1920&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgF7NrOfx2Ijubnwzsp5SA40HMMB5a37yWT49K-2d2OCQhwSAXnATBF2XE0seW1HfMpdGi89JLrhBqOP1FYcIgQVfXq7YFbAuv_fU9vAq6fzQfM0C8BCMN1gQetw2koE1R5PsVq72UjZ2FajAJ5GZ8L4r0wGG9ifsyLVDyAZ6O23BUJuqFczW4rwUfMqvY/w640-h360/MakeAntennasGreatAgain_1.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;At the &lt;a href=&quot;https://www.cambridgewireless.co.uk/resource/cwtec-6g-anarchy-in-the-uk-how-does-the-uk-get-what-it-needs-in-the-6g-era.html&quot; target=&quot;_blank&quot;&gt;CW TEC 2025 conference&lt;/a&gt; hosted by Cambridge Wireless, veteran wireless engineer &lt;a href=&quot;https://www.linkedin.com/in/moray-rumney-2577691/&quot; target=&quot;_blank&quot;&gt;Moray Rumney&lt;/a&gt; delivered a presentation that challenged the direction the mobile industry has taken. With decades of experience and a sharp eye for what matters, he highlighted a growing and largely ignored problem: the steady decline in the efficiency of antennas in mobile devices.&lt;/p&gt;&lt;p&gt;The evolution of mobile technology has delivered remarkable achievements. From the early days of GSM to the promises of 5G and the ambition of 6G, the industry has continually pushed for higher speeds, more features and greater spectral efficiency. Yet along the way, something essential has been lost. While much of the focus has been on network-side innovation and baseband complexity, the performance of the user device antenna has deteriorated to the point where it is now undermining the potential benefits of these advancements.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiSO_eRtj9Az7PufL3YbBUa7_lyN85BZr1hYL4HYXShDVWQhSGzuQb1MlYklh1Z_vVP4GTqYB5CA0h5IRrAgu21FEMx4kikEjrVD3bI19ZjR2XyOM27PelKwBI0sKxA_hWIl4vpvqvzFXHTMfn-35nWdRLUz5Yx8AS4_RpG4pkpQyBQPpdzdVJI0U-Ci-o/s1920/MakeAntennasGreatAgain_3.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1080&quot; data-original-width=&quot;1920&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiSO_eRtj9Az7PufL3YbBUa7_lyN85BZr1hYL4HYXShDVWQhSGzuQb1MlYklh1Z_vVP4GTqYB5CA0h5IRrAgu21FEMx4kikEjrVD3bI19ZjR2XyOM27PelKwBI0sKxA_hWIl4vpvqvzFXHTMfn-35nWdRLUz5Yx8AS4_RpG4pkpQyBQPpdzdVJI0U-Ci-o/w640-h360/MakeAntennasGreatAgain_3.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;According to Moray, antenna performance in smartphones has declined by around 15 decibels since the transition from external antennas in 2G to today’s smartphones. That level of loss has a profound impact. A poor antenna reduces both transmitted and received signal strength. On the uplink side, this means users need to push more power to the network, which drains battery life faster. On the downlink, it forces the network to compensate with stronger transmissions, increasing inter-cell interference and lowering cell-edge throughput. Ultimately, this undermines the overall efficiency and quality of mobile networks. Cell edge performance and indoor coverage is much degraded.&lt;/p&gt;&lt;p&gt;The root of the problem lies in modern smartphone design priorities. Over the years, devices have become slimmer, more stylish and packed with more features. In this pursuit of sleekness, antennas have been compromised. External antennas gave way to internal ones, squeezed into tight spaces surrounded by metal and glass. The visual appeal of the phone has taken precedence over its radio performance. On a technical level, the explosion in the number of supported bands and the increased use of multi-antenna transceivers optimized for high performance in excellent conditions, has reduced the available space for each antenna, reducing the antenna gain accordingly.&lt;/p&gt;&lt;p&gt;This issue was particularly pronounced during the LTE era, where the standards bodies failed to define any radiated performance requirements. Handset performance is based&amp;nbsp; on conducted power, which can appear satisfactory in laboratory conditions. However, once the signal passes through the device&#39;s real antenna, the result is often a significant loss. Real-world radiated performance does not match lab conducted measurements.&lt;/p&gt;&lt;p&gt;One of Moray&#39;s more memorable illustrations compared the situation to a tube of toothpaste. The conducted performance, which all devices meet, is like a full tube of toothpaste, but with years passing before radiated requirements were finally defined for a few bands in 5G, products with inferior radiated performance were released to the market, which put downward pressure on the radiated requirements that were finally agreed – like squeezing out all the toothpaste. What is left today is a small residue of what used to be. Once compromised, it is extremely difficult to reverse this trend.&lt;/p&gt;&lt;p&gt;He also pointed out a structural problem in how mobile standards are developed. The focus is disproportionately placed on baseband processing and theoretical possibilities, rather than on end-user experience and what actually gets deployed. As new generations arrive, more complexity is added, yet basic aspects like antenna efficiency are overlooked. Testing practices further entrench the problem, as the use of a 50-ohm connector during lab testing limits the scope for real antenna improvements, preventing designers from achieving optimal matching and performance.&lt;/p&gt;&lt;p&gt;Despite all the talk of 6G and beyond, the reality on the ground is less impressive. The UK currently ranks 59th in global mobile speed tests. This is not because of a lack of advanced standards or spectrum, but because of poor deployment decisions and device-related issues like inefficient antennas. It is not a technology gap but a failure to focus on basics that truly matter to users.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-DkIiLTtIMfErlHOY5F9iI6JvLYZmg4E4j1PJdChl_iWn_LdzILvyT49hRrav9D8FFaidOADvqlgRE73xONP3eRcXeNOBzHzGJmGVdBrbu6VjWAJR9WOlXpCou6apzZ_3mRBfp3RP545T7HM8H4WlURtrNqeVxrQKedzjVLPR7rZifKGKmN4iG535k10/s1920/MakeAntennasGreatAgain_5.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1080&quot; data-original-width=&quot;1920&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-DkIiLTtIMfErlHOY5F9iI6JvLYZmg4E4j1PJdChl_iWn_LdzILvyT49hRrav9D8FFaidOADvqlgRE73xONP3eRcXeNOBzHzGJmGVdBrbu6VjWAJR9WOlXpCou6apzZ_3mRBfp3RP545T7HM8H4WlURtrNqeVxrQKedzjVLPR7rZifKGKmN4iG535k10/w640-h360/MakeAntennasGreatAgain_5.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Moray argued that significant progress could be made without waiting for 6G. Regulatory bodies could introduce minimum standards for antenna performance, as was once attempted in Denmark. Device certification could include antenna efficiency ratings, encouraging manufacturers to prioritise performance. Networks could enforce stricter indoor coverage targets, and pricing models could be rethought to reduce the strain caused by low-value, high-volume traffic.&lt;/p&gt;&lt;p&gt;He also called attention to battery life, another casualty of inefficient antennas and poor design decisions. Users now routinely carry power banks to get through the day. This is hardly a sign of progress, especially considering the environmental impact of producing and charging these extra devices.&lt;/p&gt;&lt;p&gt;In conclusion, while the industry continues to chase ambitious visions for future generations of mobile technology, there is an urgent need to fix the basics. Antennas are not an exciting topic, but they are fundamental. Without efficient antennas, all the investment in infrastructure, spectrum and software optimisation is wasted. It is time for the industry to refocus, reassess and revalue the importance of the one component every user relies on, but rarely sees.&lt;/p&gt;&lt;p&gt;It really is time to make antennas great again.&lt;/p&gt;&lt;p&gt;Moray’s presentation is embedded below and is available to download from &lt;a href=&quot;https://www.3g4g.co.uk/3GPP/2025_07_09_CWTEC_6G_MorayRumney.pdf&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;445&quot; marginheight=&quot;0&quot; marginwidth=&quot;0&quot; scrolling=&quot;no&quot; src=&quot;https://www.slideshare.net/slideshow/embed_code/key/CFS2ud4UMNORSr?startSlide=1&quot; style=&quot;border-width: 1px; border: var(--border-1) solid #CCC; margin-bottom: 5px; max-width: 100%;&quot; width=&quot;645&quot;&gt;&lt;/iframe&gt; &lt;/p&gt;&lt;div style=&quot;margin-bottom: 5px;&quot;&gt;&lt;strong&gt; &lt;a href=&quot;https://www.slideshare.net/slideshow/the-rise-and-fall-of-3gpp-time-for-a-sabbatical/282283227&quot; target=&quot;_blank&quot; title=&quot;The Rise and Fall of 3GPP – Time for a Sabbatical?&quot;&gt;The Rise and Fall of 3GPP – Time for a Sabbatical?&lt;/a&gt; &lt;/strong&gt; from &lt;strong&gt; &lt;a href=&quot;https://www.slideshare.net/3G4GLtd&quot; target=&quot;_blank&quot;&gt;3G4G&lt;/a&gt; &lt;/strong&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;iframe width=&quot;640&quot; height=&quot;360&quot; src=&quot;https://www.youtube.com/embed/Q6YuWfzTyLg?si=G0FK0httRashjZ91&quot; title=&quot;YouTube video player&quot; frameborder=&quot;0&quot; allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; allowfullscreen&gt;&lt;/iframe&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;Related Posts&lt;/b&gt;:&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2022/01/what-is-rf-front-end-rffe-and-why-is-it.html&quot;&gt;What is RF Front-End (RFFE) and why is it so Important?&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;</description><link>https://blog.3g4g.co.uk/2025/08/is-6g-our-last-chance-to-make-antennas.html</link><author>noreply@blogger.com (Zahid Ghadialy)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgF7NrOfx2Ijubnwzsp5SA40HMMB5a37yWT49K-2d2OCQhwSAXnATBF2XE0seW1HfMpdGi89JLrhBqOP1FYcIgQVfXq7YFbAuv_fU9vAq6fzQfM0C8BCMN1gQetw2koE1R5PsVq72UjZ2FajAJ5GZ8L4r0wGG9ifsyLVDyAZ6O23BUJuqFczW4rwUfMqvY/s72-w640-h360-c/MakeAntennasGreatAgain_1.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1834236085756782640.post-5281346793063156346</guid><pubDate>Thu, 24 Jul 2025 06:35:00 +0000</pubDate><atom:updated>2025-07-24T08:43:30.704+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">5G</category><category domain="http://www.blogger.com/atom/ns#">AR / VR / MR / XR</category><category domain="http://www.blogger.com/atom/ns#">Ericsson</category><category domain="http://www.blogger.com/atom/ns#">Fixed Network</category><category domain="http://www.blogger.com/atom/ns#">Fixed Wireless Access</category><category domain="http://www.blogger.com/atom/ns#">L4S</category><category domain="http://www.blogger.com/atom/ns#">Nokia Networks</category><category domain="http://www.blogger.com/atom/ns#">T-Mobile USA</category><category domain="http://www.blogger.com/atom/ns#">TCP/IP</category><category domain="http://www.blogger.com/atom/ns#">URLLC</category><category domain="http://www.blogger.com/atom/ns#">White Papers and Reports</category><title>L4S and the Future of Real-Time Performance in 5G and Beyond</title><description>&lt;p&gt;As mobile networks continue to evolve to support increasingly immersive and responsive services, the importance of consistent low latency has never been greater. Whether it is cloud gaming, extended reality, remote machine operation or real-time collaboration, all these applications rely on the ability to react instantly to user input. The slightest delay can affect the user experience, making the role of the network even more critical.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEicNADJfuJYZUEKMUsO3vTmDy4DZCkEyeJcPa3k1c4rwwbeeyfXr7GmVc5fUCdjGBSqp4HMQF2TdotE5qbSY9g9ISmrHq7go3mCorAP3VaqT-nnvdO5CqJOaG5xET9494Ei9OZMyf5AVjGn3Zb07NmGEwJUqrnjBKwyspfwwPeeOvROkOPhWJO430VnC2w/s1920/NokiaBellLabs_L4Swhitepaper_1.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1080&quot; data-original-width=&quot;1920&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEicNADJfuJYZUEKMUsO3vTmDy4DZCkEyeJcPa3k1c4rwwbeeyfXr7GmVc5fUCdjGBSqp4HMQF2TdotE5qbSY9g9ISmrHq7go3mCorAP3VaqT-nnvdO5CqJOaG5xET9494Ei9OZMyf5AVjGn3Zb07NmGEwJUqrnjBKwyspfwwPeeOvROkOPhWJO430VnC2w/w640-h360/NokiaBellLabs_L4Swhitepaper_1.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;While 5G has introduced major improvements in radio latency and overall throughput, many time-critical applications are still affected by a factor that is often overlooked - &lt;a href=&quot;https://www.nokia.com/bell-labs/research/l4s/&quot; target=&quot;_blank&quot;&gt;queuing delay&lt;/a&gt;. This occurs when packets build up in buffers before they are forwarded, creating spikes in delay and jitter. Traditional methods for congestion control, such as those based on packet loss, are too slow to react, especially in mobile environments where network conditions can change rapidly.&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;i&gt;Low Latency, Low Loss and Scalable Throughput (L4S)&lt;/i&gt;&lt;/b&gt;, is a new network innovation designed to tackle this challenge. It is an Internet protocol mechanism developed through the Internet Engineering Task Force, and has recently reached standardisation. L4S focuses on preventing queuing delays by marking packets early when congestion is building, instead of waiting until buffers overflow and packets are dropped. The key idea is to use explicit signals within the network to guide congestion control at the sender side.&lt;/p&gt;&lt;p&gt;Applications that support L4S are able to reduce their sending rate quickly when congestion starts to appear. This is done by using ECN, or Explicit Congestion Notification, which involves marking rather than dropping packets. The result is a smooth and continuous flow of data, where latency remains low and throughput remains high, even in changing network conditions.&lt;/p&gt;&lt;p&gt;One of the significant benefits of L4S is its ability to support a wide range of real-time services at scale. &lt;a href=&quot;https://www.ericsson.com/en/reports-and-papers/white-papers/enabling-time-critical-applications-over-5g-with-rate-adaptation&quot; target=&quot;_blank&quot;&gt;Ericsson highlights&lt;/a&gt; how edge-based applications such as cloud gaming, virtual reality and drone control need stable low-latency connections alongside high bitrates. While over-the-top approaches to congestion control may work for general streaming, they struggle in mobile environments. This is due to variability in channel quality and radio access delays, which can cause sudden spikes in latency. L4S provides a faster and more direct way to detect congestion within the radio network, enabling better performance for these time-sensitive applications.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgN5pVzannMkH0DWDq_aHEqA9JEMxfGB94Zp9GJwp5UYAD2fo20AFEPc4xZf5Lb5ht6FdWyVnyDtL5C386OMLsNGl7bUBDlCXTSvlZDS3rf5Wcnr5x7gj7CgxnD65vEwuYmdlPr9HD87vzdeXX6vOvg3kqtnddwQb0hLTj0xnLNGJSQZXSsCnrECP3eqnM/s1920/Ericsson_L4SsolutionInRAN.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1080&quot; data-original-width=&quot;1920&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgN5pVzannMkH0DWDq_aHEqA9JEMxfGB94Zp9GJwp5UYAD2fo20AFEPc4xZf5Lb5ht6FdWyVnyDtL5C386OMLsNGl7bUBDlCXTSvlZDS3rf5Wcnr5x7gj7CgxnD65vEwuYmdlPr9HD87vzdeXX6vOvg3kqtnddwQb0hLTj0xnLNGJSQZXSsCnrECP3eqnM/w640-h360/Ericsson_L4SsolutionInRAN.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;To make this possible, mobile networks need to support L4S in a way that keeps its traffic separate from traditional data flows. This involves using dedicated queues for L4S traffic to ensure it is not delayed behind bulk data transfers. In 5G, this is implemented through dedicated quality-of-service flows, allowing network elements to detect and handle L4S traffic differently. For example, if a mobile user is playing a cloud-based game, the network can identify this traffic and place it on an L4S-optimised flow. This avoids interference from other applications, such as file downloads or video streaming.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.nokia.com/asset/213410/&quot; target=&quot;_blank&quot;&gt;Nokia&#39;s approach&lt;/a&gt; further explains how L4S enables fair sharing of bandwidth between classic and L4S traffic without compromising performance. A dual-queue system allows both types of traffic to coexist while preserving the low-latency characteristics of L4S. This is especially important in scenarios where both legacy and L4S-capable applications are in use. In simulations and trials, the L4S mechanism has shown the ability to maintain very low delay even when the link experiences sudden reductions in capacity, which is common in mobile and Wi-Fi networks.&lt;/p&gt;&lt;p&gt;One of the important aspects of L4S is that it requires support both from the application side and within the network. On the application side, rate adaptation based on L4S can be implemented within the app itself, often using modern transport protocols such as QUIC or TCP extensions. Many companies, including device makers and platform providers, are already trialling support for this approach.&lt;/p&gt;&lt;p&gt;Within the network, L4S depends on the ability of routers and radio access equipment to read and mark ECN bits correctly. In mobile networks, the radio access network is typically the key bottleneck where marking should take place. This ensures that congestion is detected at the right point in the path, allowing for quicker response and improved performance.&lt;/p&gt;&lt;p&gt;Although L4S is distinct from ultra-reliable low-latency communication, it can complement those use cases where guaranteed service is needed in controlled environments. What makes L4S more versatile is its scalability and suitability for open internet and large-scale public network use. It can work across both fixed and mobile access networks, providing a common framework for interactive services regardless of access technology.&lt;/p&gt;&lt;p&gt;With L4S in place, it becomes possible to offer new kinds of applications that were previously limited by latency constraints. This includes lighter and more wearable XR headsets that can offload processing to the cloud, or port automation systems that rely on remote control of heavy equipment. Even everyday experiences, such as video calls or online gaming, stand to benefit from a more responsive and stable network connection.&lt;/p&gt;&lt;p&gt;Ultimately, L4S offers a practical and forward-looking approach to delivering the consistent low latency needed for the next generation of digital experiences. By creating a tighter feedback loop between the network and the application, and by applying congestion signals in a more intelligent way, L4S helps unlock the full potential of 5G and future networks.&lt;/p&gt;&lt;p&gt;This &lt;a href=&quot;https://www.youtube.com/watch?v=hBlJ7wXtK_o&quot; target=&quot;_blank&quot;&gt;introductory video&lt;/a&gt; by CableLabs is a good starting point for anyone willing to dig deeper in the topic. This &lt;a href=&quot;https://www.linkedin.com/posts/deanbubley_l4s-wifi-wifi8-activity-7333434605863145472-sslo/&quot; target=&quot;_blank&quot;&gt;LinkedIn post&lt;/a&gt; by Dean Bubley and the comments are also worth a read.&lt;/p&gt;&lt;p&gt;&lt;i&gt;&lt;b&gt;PS&lt;/b&gt;: Just noticed that T-Mobile USA have announced earlier this week that they are the first to unlock L4S in wireless . You can read their blog post&amp;nbsp;&lt;a href=&quot;https://www.t-mobile.com/news/network/unlock-l4s-5g-advanced&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;&amp;nbsp;and a promotional video is available in the Tweet below&amp;nbsp;👇&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;blockquote class=&quot;twitter-tweet&quot;&gt;&lt;p dir=&quot;ltr&quot; lang=&quot;en&quot;&gt;Your apps need more than speed—they need responsiveness.&lt;br /&gt;&lt;br /&gt;L4S is now live on our 5G Advanced network, delivering lower latency, less lag, and smarter performance for things like XR, video calls, and remote driving.&lt;br /&gt;&lt;br /&gt;CTO &lt;a href=&quot;https://twitter.com/JohnSaw?ref_src=twsrc%5Etfw&quot;&gt;@JohnSaw&lt;/a&gt; explains: &lt;a href=&quot;https://t.co/4VMI3WbZE2&quot;&gt;https://t.co/4VMI3WbZE2&lt;/a&gt; &lt;a href=&quot;https://t.co/mZ60nvDoM4&quot;&gt;pic.twitter.com/mZ60nvDoM4&lt;/a&gt;&lt;/p&gt;— T-Mobile Business (@TMobileBusiness) &lt;a href=&quot;https://twitter.com/TMobileBusiness/status/1947318651369271575?ref_src=twsrc%5Etfw&quot;&gt;July 21, 2025&lt;/a&gt;&lt;/blockquote&gt; &lt;script async=&quot;&quot; charset=&quot;utf-8&quot; src=&quot;https://platform.twitter.com/widgets.js&quot;&gt;&lt;/script&gt;&lt;p&gt;&lt;/p&gt;</description><link>https://blog.3g4g.co.uk/2025/07/l4s-and-future-of-real-time-performance.html</link><author>noreply@blogger.com (Zahid Ghadialy)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEicNADJfuJYZUEKMUsO3vTmDy4DZCkEyeJcPa3k1c4rwwbeeyfXr7GmVc5fUCdjGBSqp4HMQF2TdotE5qbSY9g9ISmrHq7go3mCorAP3VaqT-nnvdO5CqJOaG5xET9494Ei9OZMyf5AVjGn3Zb07NmGEwJUqrnjBKwyspfwwPeeOvROkOPhWJO430VnC2w/s72-w640-h360-c/NokiaBellLabs_L4Swhitepaper_1.jpg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1834236085756782640.post-7877129723983136439</guid><pubDate>Tue, 01 Jul 2025 06:35:00 +0000</pubDate><atom:updated>2025-07-01T08:04:31.798+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">3GPP</category><category domain="http://www.blogger.com/atom/ns#">5G</category><category domain="http://www.blogger.com/atom/ns#">5G-Advanced</category><category domain="http://www.blogger.com/atom/ns#">eMBB</category><category domain="http://www.blogger.com/atom/ns#">GBRSS</category><category domain="http://www.blogger.com/atom/ns#">HDLLC</category><category domain="http://www.blogger.com/atom/ns#">HMTC</category><category domain="http://www.blogger.com/atom/ns#">mMTC</category><category domain="http://www.blogger.com/atom/ns#">Network Slicing</category><category domain="http://www.blogger.com/atom/ns#">Release 19</category><category domain="http://www.blogger.com/atom/ns#">URLLC</category><category domain="http://www.blogger.com/atom/ns#">V2X</category><title>The Evolution of 3GPP 5G Network Slice and Service Types (SSTs)</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhNdBYhct4d8Slv4xHGh-H8cG6XfVMiqfQ9KmeKFmsYFNygUFuKZr6L1EWwaoyA14qD2kE2tOXaCwCB8Pr3d8bwoMmN6NK-Fli7PkJIgYC4mZWplfjYWN6aXkdDWxu6Da87sEhldSSVvA1y7v39cRr_LxtSZyrlCb0lZap8ttgZj4_F_6mZ7luBIl9qu3I/s1920/3G4G_3GPP_SST_Values_Release19.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1080&quot; data-original-width=&quot;1920&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhNdBYhct4d8Slv4xHGh-H8cG6XfVMiqfQ9KmeKFmsYFNygUFuKZr6L1EWwaoyA14qD2kE2tOXaCwCB8Pr3d8bwoMmN6NK-Fli7PkJIgYC4mZWplfjYWN6aXkdDWxu6Da87sEhldSSVvA1y7v39cRr_LxtSZyrlCb0lZap8ttgZj4_F_6mZ7luBIl9qu3I/w640-h360/3G4G_3GPP_SST_Values_Release19.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;The concept of network slicing has been one of the standout features in 5G (no pun intended). It allows operators to offer logically isolated networks over shared infrastructure, each tailored for specific applications or services. These slices are identified using a combination of the Slice/Service Type (SST) and an optional Slice Differentiator (SD), together forming what is called a Single Network Slice Selection Assistance Information (S-NSSAI).&lt;/p&gt;&lt;p&gt;To ensure global interoperability and support for roaming scenarios, 3GPP standardises a set of SST values. These are intended to provide common ground across public land mobile networks for the most prevalent slice types. Over the course of different 3GPP releases, the list of standardised SST values has grown to reflect emerging use cases and evolving requirements.&lt;/p&gt;&lt;p&gt;The foundation was laid in Release 15, where the first three SST values were introduced. SST 1 represents enhanced Mobile Broadband (eMBB), suitable for high throughput services like video streaming, large file downloads and augmented reality. SST 2 refers to Ultra-Reliable and Low-Latency Communications (URLLC), designed for time-sensitive applications such as factory automation, remote surgery and smart grids. SST 3 is for Massive Internet of Things (mIoT - earlier referred to as mMTC), tailored for large-scale deployments of low-power sensors in use cases such as smart metering and logistics.&lt;/p&gt;&lt;p&gt;The first major extension came with Release 16, which introduced SST 4 for Vehicle-to-Everything (V2X) services. This slice type addresses the requirements of connected vehicles, particularly in terms of ultra low latency, high reliability and localised communication. It was the first time a vertical-specific slice type was defined.&lt;/p&gt;&lt;p&gt;With Release 17, the slicing framework was extended further to include SST 5, defined for High-Performance Machine-Type Communications (HMTC). This slice is aimed at industrial automation and use cases that require highly deterministic and reliable communication patterns between machines. It enhances the original URLLC profile by refining it for industrial-grade requirements.&lt;/p&gt;&lt;p&gt;Recognising the growing importance of immersive services, Release 18 added SST 6, defined for High Data Rate and Low Latency Communications (HDLLC). This slice targets extended reality, cloud gaming and other applications that simultaneously demand low delay and high bandwidth. It goes beyond what enhanced Mobile Broadband or URLLC individually offer by addressing the combination of both extremes. The documentation refers to this as being suitable for extended reality and media services, underlining the increasing focus on immersive technologies and their networking needs.&lt;/p&gt;&lt;p&gt;Finally, Release 19 introduced SST 7 for Guaranteed Bit Rate Streaming Services (GBRSS). This new slice supports services where continuous, guaranteed throughput is essential. It is particularly relevant for live broadcasting, high-definition streaming, or virtual presence applications where quality cannot degrade over time.&lt;/p&gt;&lt;p&gt;This gradual and deliberate expansion of standardised SSTs highlights how 5G is not a one-size-fits-all solution. Instead, it is a dynamic platform that adapts to the needs of different industries. As use cases grow more sophisticated and diverse, having standardised slice types helps ensure compatibility, simplify device and network configuration, and promote innovation.&lt;/p&gt;&lt;p&gt;It is also worth noting that these SST values are not mandatory for every operator to implement. A network can choose to support a subset based on its service strategy. For example, a public network may prioritise SSTs 1 and 3, while a private industrial deployment might focus on SST 5 or 7.&lt;/p&gt;&lt;p&gt;With slicing increasingly central to how 5G will be &quot;monetised&quot; and deployed, expect this list to keep growing in future releases. Each new SST tells a story about where the telecoms ecosystem is heading.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Related Posts&lt;/b&gt;:&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2022/09/is-there-compelling-business-case-for.html&quot;&gt;Is there a compelling Business Case for 5G Network Slicing in Public Networks?&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2021/11/network-slicing-using-user-equipment.html&quot;&gt;Network Slicing using User Equipment Route Selection Policy (URSP)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2021/10/qos-flow-establishments-in-5g.html&quot;&gt;QoS Flow Establishments in 5G Standalone RAN and Core&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2021/03/how-to-identify-network-slices-in-ng-ran.html&quot;&gt;How to Identify Network Slices in NG RAN&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2021/02/network-slicing-in-ng-ran.html&quot;&gt;Network Slicing in NG RAN&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2020/11/network-slicing-tutorials-and-other.html&quot;&gt;Network Slicing Tutorials and Other Resources&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2019/01/5g-slicing-templates.html&quot;&gt;5G Slicing Templates&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2018/09/end-to-end-network-slicing-in-5g.html&quot;&gt;End-to-end Network Slicing in 5G&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;</description><link>https://blog.3g4g.co.uk/2025/07/the-evolution-of-3gpp-5g-network-slice.html</link><author>noreply@blogger.com (Zahid Ghadialy)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhNdBYhct4d8Slv4xHGh-H8cG6XfVMiqfQ9KmeKFmsYFNygUFuKZr6L1EWwaoyA14qD2kE2tOXaCwCB8Pr3d8bwoMmN6NK-Fli7PkJIgYC4mZWplfjYWN6aXkdDWxu6Da87sEhldSSVvA1y7v39cRr_LxtSZyrlCb0lZap8ttgZj4_F_6mZ7luBIl9qu3I/s72-w640-h360-c/3G4G_3GPP_SST_Values_Release19.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1834236085756782640.post-8411740991487585911</guid><pubDate>Tue, 10 Jun 2025 06:35:00 +0000</pubDate><atom:updated>2025-06-10T08:58:23.368+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">AI</category><category domain="http://www.blogger.com/atom/ns#">Cloud Computing</category><category domain="http://www.blogger.com/atom/ns#">Cloud Native</category><category domain="http://www.blogger.com/atom/ns#">Gartner</category><category domain="http://www.blogger.com/atom/ns#">GenAI</category><category domain="http://www.blogger.com/atom/ns#">Network Infrastructure</category><category domain="http://www.blogger.com/atom/ns#">Network Transformation</category><category domain="http://www.blogger.com/atom/ns#">T-Systems</category><category domain="http://www.blogger.com/atom/ns#">Videos</category><title>Cloud Native Telco Transformation Insights from T-Systems</title><description>&lt;p&gt;The journey to becoming a cloud-native telco is not just a buzzword exercise. It requires a full-scale transformation of networks, business models, and operating cultures. At Mobile Europe’s Becoming a Cloud-Native Telco virtual event, Richard Simon, CTO at T-Systems International, outlined how telcos are grappling with this change, sharing insights from both successes and ongoing challenges.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0NCbebCvLFY5jZ6mFPQQThI3s5XywbFnO77dMPmwmLhyI5Mm8jERhr7I17z1-OrpaRh-SJwZhZmcp2R7DqYoE2_lisYwyuyPndVbJnVP5cWFQy36ujTO-xOvIyfwPdS26R_Jf6hn0e6H_l9BNN8IjeZbUWZd65EdE-fCZdZUB03aNVpZff9RQYciqhpU/s1920/RichardSimon_BecomingACloudNativeTelco.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1080&quot; data-original-width=&quot;1920&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0NCbebCvLFY5jZ6mFPQQThI3s5XywbFnO77dMPmwmLhyI5Mm8jERhr7I17z1-OrpaRh-SJwZhZmcp2R7DqYoE2_lisYwyuyPndVbJnVP5cWFQy36ujTO-xOvIyfwPdS26R_Jf6hn0e6H_l9BNN8IjeZbUWZd65EdE-fCZdZUB03aNVpZff9RQYciqhpU/w640-h360/RichardSimon_BecomingACloudNativeTelco.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Cloud-native is not just about adopting containers or orchestrating with Kubernetes. Richard Simon described it as a maturity model that demands strategic vision, architectural readiness, and cultural shift. The telco industry, long rooted in proprietary systems, is gradually moving towards software-defined infrastructure. Network Function Virtualisation (NFV) remains foundational, enabling operators to decouple traditional monolithic services and deliver them in a modular, digital-native manner—whether in private data centres or public clouds.&lt;/p&gt;&lt;p&gt;The industry is also seeing the rise of platform engineering. This evolution builds on DevOps and site reliability engineering (SRE) to create standardised internal developer platforms. These platforms reduce cognitive load for developers, increase consistency in toolchains and workflows, and enable a shift-left approach for operations and security. It is a critical step towards making innovation scalable and repeatable within telcos.&lt;/p&gt;&lt;p&gt;The cloud-native ecosystem has exploded in scope, with the CNCF landscape illustrating the diversity and maturity of open source components now in use. Telcos, once cautious about community-led projects, are now not only consuming but also contributing to open source. This openness is pivotal for achieving agility and interoperability in a multivendor environment.&lt;/p&gt;&lt;p&gt;With the increasing complexity of hybrid and multicloud strategies, avoiding vendor lock-in has become essential. Richard highlighted how telcos are optimising costs, improving resilience, and aligning workloads with the most suitable cloud environments. Multicloud is no longer a theoretical construct. It is operational reality. But with it comes the need for new thinking around cloud economics.&lt;/p&gt;&lt;p&gt;Cloud financial operations are no longer limited to cost tracking. They now include strategic frameworks (FinOps), real-time cost management, and a growing focus on application profiling. Profiling looks at how software consumes cloud resources, guiding developers to write more efficient code and enabling cost-effective deployments.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhePLnnCYkzGlvk9jlDv3G0C9OBlaj0J2WpxWxp8UlnB4AwHcg6_RMBMCxfOfsZYrOy5Bn7oClDvQhXVgCzesuW6Wf-0iJYWmpX1hzLIyOyJAD_FNPHOCj9mpChG9tNbnHLVxEsDFlifuMsnS80gxpJHk_DBKHvL4ooZxNCT9Y9_it4wMb_fAxkckuW180/s1920/RichardSimon_BecomingACloudNativeTelco1.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1080&quot; data-original-width=&quot;1920&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhePLnnCYkzGlvk9jlDv3G0C9OBlaj0J2WpxWxp8UlnB4AwHcg6_RMBMCxfOfsZYrOy5Bn7oClDvQhXVgCzesuW6Wf-0iJYWmpX1hzLIyOyJAD_FNPHOCj9mpChG9tNbnHLVxEsDFlifuMsnS80gxpJHk_DBKHvL4ooZxNCT9Y9_it4wMb_fAxkckuW180/w640-h360/RichardSimon_BecomingACloudNativeTelco1.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;While generative AI dominates headlines, the pace of adoption in telco is deliberate. Richard pointed out that while investment in GenAI is widespread, only a small fraction of deployments have reached production. Most telcos are still in proof-of-concept or pilot phases, reflecting the technical and regulatory complexity involved.&lt;/p&gt;&lt;p&gt;Unlike some sectors, telcos face strict compliance requirements. GenAI inference stages—when customer data is processed—raise concerns around data sovereignty and privacy. As a result, telcos are exploring how to balance innovation with responsibility. Some are experimenting with fine-tuning foundational models internally, while others prefer to consume GenAI as a service, depending on use cases ranging from network automation to document processing.&lt;/p&gt;&lt;p&gt;GenAI is a high-performance computing (HPC) workload. Training large models requires significant infrastructure, making decisions around build versus buy critical. Richard outlined three tiers of AI adoption: infrastructure-as-a-service for DIY approaches, foundation-model-as-a-service for fine-tuning, and software-as-a-service for fully hosted solutions. Each tier comes with trade-offs in control, cost, and complexity.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEbqxlWD2ODo8e9yLwAm-CyC8sLWwvRmL2L_ihR52O5Va2ddMimg6sX9ShuWGe1oYwwWpar2cpvJRgWfWxc_ERYbMK6bh3a4T2_Wi9t7Rv_EhOpH7U14EOLWODKSS8dSeQXHicm2dtwY-H1-tCLgn36Ft_agisB2LX6WY0xpp0-SfudwQCSwLOEL6I7QM/s1920/RichardSimon_BecomingACloudNativeTelco2.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1080&quot; data-original-width=&quot;1920&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEbqxlWD2ODo8e9yLwAm-CyC8sLWwvRmL2L_ihR52O5Va2ddMimg6sX9ShuWGe1oYwwWpar2cpvJRgWfWxc_ERYbMK6bh3a4T2_Wi9t7Rv_EhOpH7U14EOLWODKSS8dSeQXHicm2dtwY-H1-tCLgn36Ft_agisB2LX6WY0xpp0-SfudwQCSwLOEL6I7QM/w640-h360/RichardSimon_BecomingACloudNativeTelco2.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Looking ahead, three themes stood out in Richard’s conclusions.&lt;/p&gt;&lt;p&gt;First, the era of AI agents is beginning. These autonomous systems, capable of reasoning and acting across complex tasks, will be the next experimentation frontier. Pilots in 2025 and 2026 will pave the way for a broader agentic AI economy.&lt;/p&gt;&lt;p&gt;Second, cloud economics continues to evolve. Operators must invest in cost visibility and governance rather than reactively scaling back cloud usage. The emergence of profiling and observability tooling is helping align cost with performance and business value.&lt;/p&gt;&lt;p&gt;Third, sovereignty is rising in importance. Telcos must ensure control over data and infrastructure, not only to comply with regional regulations but also to maintain intellectual property and operational resilience. Sovereign cloud models, abstracted control planes, and localised inference infrastructure are becoming strategic imperatives.&lt;/p&gt;&lt;p&gt;His complete talk is embedded below:&lt;/p&gt;&lt;p&gt;&lt;iframe allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;315&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; src=&quot;https://www.youtube.com/embed/Up795AuUXV8?si=kl9UUje5WXIMJJla&quot; title=&quot;YouTube video player&quot; width=&quot;560&quot;&gt;&lt;/iframe&gt;&lt;/p&gt;&lt;p&gt;The cloud-native journey is not linear. It requires operators to architect for modularity, align with open ecosystems, and stay grounded in real-world economics. As Richard Simon’s keynote showed, the transformation is well underway, but its success will depend on how telcos integrate cloud, AI, and sovereignty into a coherent and adaptable strategy.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Related Posts&lt;/b&gt;:&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2020/10/what-is-cloud-native-and-how-is-it.html&quot;&gt;What is Cloud Native and How is it Transforming the Networks?&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Operator Watch Blog: &lt;a href=&quot;https://www.operatorwatch.com/2025/04/cloud-native-progress-and-pain-points.html&quot;&gt;Cloud Native Progress and Pain Points According to Orange&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog - &lt;a href=&quot;https://blog.3g4g.co.uk/2025/01/lessons-from-anrw-24-ai-and-cloud-in.html&quot;&gt;Lessons from ANRW ’24: AI and Cloud in 5G/6G Systems&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2024/07/disaggregation-of-5g-core-core-network.html&quot;&gt;Disaggregation of 5G Core (5GC) Network&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2025/02/reigniting-growth-in-telecom-industry.html&quot;&gt;Reigniting Growth in the Telecom Industry with AI and Cloud&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2022/05/transitioning-from-cloud-native-to-edge.html&quot;&gt;Transitioning from Cloud-native to Edge-Native Infrastructure&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Free 6G Training: &lt;a href=&quot;https://www.free6gtraining.com/2024/01/cloud-native-architecture-migration.html&quot;&gt;Cloud Native Architecture &amp;amp; Migration Towards 6G from B6GS 2023&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Free 6G Training: &lt;a href=&quot;https://www.free6gtraining.com/2022/07/sk-telecom-claims-bare-metal-based.html&quot;&gt;SK Telecom Claims ‘Bare Metal-Based Cloud-Native 5G Core’ as Foundation for 6G Evolution&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;</description><link>https://blog.3g4g.co.uk/2025/06/cloud-native-telco-transformation.html</link><author>noreply@blogger.com (Zahid Ghadialy)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0NCbebCvLFY5jZ6mFPQQThI3s5XywbFnO77dMPmwmLhyI5Mm8jERhr7I17z1-OrpaRh-SJwZhZmcp2R7DqYoE2_lisYwyuyPndVbJnVP5cWFQy36ujTO-xOvIyfwPdS26R_Jf6hn0e6H_l9BNN8IjeZbUWZd65EdE-fCZdZUB03aNVpZff9RQYciqhpU/s72-w640-h360-c/RichardSimon_BecomingACloudNativeTelco.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1834236085756782640.post-5598713495921322961</guid><pubDate>Tue, 20 May 2025 06:35:00 +0000</pubDate><atom:updated>2025-05-20T08:19:05.717+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">5G</category><category domain="http://www.blogger.com/atom/ns#">Mpirical</category><category domain="http://www.blogger.com/atom/ns#">NR</category><category domain="http://www.blogger.com/atom/ns#">Tutorials</category><category domain="http://www.blogger.com/atom/ns#">Videos</category><title>A Beginner’s Guide to the 5G Air Interface</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhWCr9esp6Y-a2Zw_s-oyJZPl5DWaawyQVoLvdeM463GCMoPJMQahbrpYgot8TvOAd2_-ZZJsUSCpRkWSz3AO-VDhyyprr2svCudZJwY7Mgx4Muz3w6jFDmwB12hbb6Ul9ilKRN-CLgusJoyB2Q3D6Q-dBzfUsOwB2Wxw7KBejOq3T8adBT06DPrtpGi6w/s1920/5GNR_SSB_ServiceBeam.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1080&quot; data-original-width=&quot;1920&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhWCr9esp6Y-a2Zw_s-oyJZPl5DWaawyQVoLvdeM463GCMoPJMQahbrpYgot8TvOAd2_-ZZJsUSCpRkWSz3AO-VDhyyprr2svCudZJwY7Mgx4Muz3w6jFDmwB12hbb6Ul9ilKRN-CLgusJoyB2Q3D6Q-dBzfUsOwB2Wxw7KBejOq3T8adBT06DPrtpGi6w/w640-h360/5GNR_SSB_ServiceBeam.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Some of you may know that I manage quite a few LinkedIn groups, and I often come across advanced presentations and videos on LTE and 5G. From time to time, people reach out asking where they can access a free beginner-level course on the 5G Air Interface. With that in mind, I was pleased to see that Mpirical have shared a recorded webinar on YouTube titled Examining the 5G Air Interface, which seems ideal for anyone looking for a basic introduction.&lt;/p&gt;&lt;p&gt;Philip Nugent, Senior Technical Trainer at Mpirical, explains some of the key terms, concepts and capabilities of 5G New Radio. The webinar provides a high level overview of several important topics including 5G frequency bands and ranges, massive MIMO and beamforming, protocols and resources, and a look at the typical operation of a 5G device. It concludes with a short trainer Q&amp;amp;A session.&lt;/p&gt;&lt;p&gt;The video is embedded below:&lt;/p&gt;&lt;p&gt;&lt;iframe allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;315&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; src=&quot;https://www.youtube.com/embed/nQNC48z-yw8?si=1OsUEtuYVcmy7_2Y&quot; title=&quot;YouTube video player&quot; width=&quot;560&quot;&gt;&lt;/iframe&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;Related Posts&lt;/b&gt;:&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Udemy: &lt;a href=&quot;https://bit.ly/udemy5G&quot; target=&quot;_blank&quot;&gt;5G for Absolute Beginners&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2024/08/explaining-telecoms.html&quot;&gt;Explaining Telecoms&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2020/12/nokia-lectures-in-collaboration-with.html&quot;&gt;Nokia Lectures in Collaboration with Bangalore University&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog - &lt;a href=&quot;https://blog.3g4g.co.uk/2023/08/tutorial-quick-introduction-to-3gpp.html&quot;&gt;Tutorial: A Quick Introduction to 3GPP&lt;/a&gt;&lt;/li&gt;&lt;li&gt;3G4G: &lt;a href=&quot;https://www.3g4g.co.uk/5G/5Gtech_0003_Standards.html&quot;&gt;3GPP 5G Specifications&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2024/10/techknowledge-technology-stories-series.html&quot;&gt;TechKnowledge Technology Stories (Series 1)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2023/09/private-networks-introductory-series.html&quot;&gt;Private Networks Introductory Series&lt;/a&gt;&lt;/li&gt;&lt;li&gt;3G4G: &lt;a href=&quot;https://www.3g4g.co.uk/5G/&quot;&gt;5G (IMT-2020) Wireless&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;</description><link>https://blog.3g4g.co.uk/2025/05/a-beginners-guide-to-5g-air-interface.html</link><author>noreply@blogger.com (Zahid Ghadialy)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhWCr9esp6Y-a2Zw_s-oyJZPl5DWaawyQVoLvdeM463GCMoPJMQahbrpYgot8TvOAd2_-ZZJsUSCpRkWSz3AO-VDhyyprr2svCudZJwY7Mgx4Muz3w6jFDmwB12hbb6Ul9ilKRN-CLgusJoyB2Q3D6Q-dBzfUsOwB2Wxw7KBejOq3T8adBT06DPrtpGi6w/s72-w640-h360-c/5GNR_SSB_ServiceBeam.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1834236085756782640.post-674941875408549589</guid><pubDate>Thu, 08 May 2025 06:35:00 +0000</pubDate><atom:updated>2025-05-08T08:09:15.566+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">5G</category><category domain="http://www.blogger.com/atom/ns#">Cellular IoT</category><category domain="http://www.blogger.com/atom/ns#">Internet of Things</category><category domain="http://www.blogger.com/atom/ns#">LTE</category><category domain="http://www.blogger.com/atom/ns#">LTE-M</category><category domain="http://www.blogger.com/atom/ns#">NB-IoT</category><category domain="http://www.blogger.com/atom/ns#">Release 18</category><category domain="http://www.blogger.com/atom/ns#">Roaming</category><title>3GPP Release 18 Signal level Enhanced Network Selection (SENSE) for Smarter Network Selection in Stationary IoT</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4zWHwxsdqZLOAjmb9aZ2nZCs91Em3r2EUJUdsAjCmky5-p1Q9FjxoG8vwvKFzMhFUGHjK97zl9gLkZ6DhVYsKlyXM1Ua2TpW0f0SRUgrH4CiLo149_41SNmPbUF5F1hEHWf2tAz96Oogo9Y0jPPKsHcgviCYfKLdMo64hle4dtW9DttVS3gYzTicN_iE/s1920/SmartWaterMeter.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1080&quot; data-original-width=&quot;1920&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4zWHwxsdqZLOAjmb9aZ2nZCs91Em3r2EUJUdsAjCmky5-p1Q9FjxoG8vwvKFzMhFUGHjK97zl9gLkZ6DhVYsKlyXM1Ua2TpW0f0SRUgrH4CiLo149_41SNmPbUF5F1hEHWf2tAz96Oogo9Y0jPPKsHcgviCYfKLdMo64hle4dtW9DttVS3gYzTicN_iE/w640-h360/SmartWaterMeter.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;As 5G evolves and the number of deployed IoT devices increases globally, efficient and reliable network selection becomes ever more critical. Particularly for stationary devices deployed in remote, deep-indoor or roaming environments, traditional selection mechanisms have struggled to provide robust connectivity. This has led to operational challenges, especially for use cases involving low-power or hard-to-reach sensors. In response, &lt;a href=&quot;https://blog.3g4g.co.uk/2024/08/3gpp-release-18-description-and-summary.html&quot; target=&quot;_blank&quot;&gt;3GPP Release 18&lt;/a&gt; introduces a new capability under the SA2 architecture work, Signal level Enhanced Network Selection (SENSE), designed to tackle this exact issue.&lt;/p&gt;&lt;p&gt;In today’s cellular systems, when a User Equipment (UE), including IoT modules, switches on or recovers from a loss of coverage, it performs automatic network selection. This typically &lt;a href=&quot;https://www.docomo.ne.jp/english/corporate/technology/rd/technical_journal/bn/vol26_3/002.html&quot; target=&quot;_blank&quot;&gt;prioritises networks&lt;/a&gt; based on preferences such as PLMN priority lists and broadcast cell selection criteria, while largely ignoring the actual signal strength at the device’s location. This approach works reasonably well for mobile consumer devices that can adapt through user movement or manual intervention. However, for stationary IoT UEs, which are often unmanned and deployed permanently in locations with limited or fluctuating radio conditions, this method can result in persistent suboptimal connectivity.&lt;/p&gt;&lt;p&gt;The issue becomes most evident when a device latches onto a visited PLMN (VPLMN) with higher priority despite poor signal quality. The UE might remain connected to this weak network, struggling to maintain bearer sessions or repeatedly failing data transfers. These failures often go undetected by the operator&#39;s monitoring systems and may require expensive manual intervention in the field. The cumulative impact of such maintenance activities adds significantly to operational expenditure, especially in mass-scale IoT deployments.&lt;/p&gt;&lt;p&gt;SENSE aims to fix this problem by making signal level an integral part of the automatic network selection and reselection process. Rather than simply following preconfigured priority rules, UEs enabled with SENSE will now assess the received signal quality during network selection. This allows them to favour networks that offer stronger and more stable radio conditions, even if they have lower priority, when such conditions are essential for reliable connectivity.&lt;/p&gt;&lt;p&gt;The capability is particularly targeted at stationary IoT UEs that support NB-IoT, EC-GSM-IoT, or LTE Cat-M1/M2. These devices are often used in applications such as water level monitoring, power grid sensors, and remote metering, installations where physical access post-deployment may be difficult or even infeasible.&lt;/p&gt;&lt;p&gt;To implement SENSE, the Home PLMN (HPLMN) can configure the UE to apply Operator Controlled Signal Thresholds (OCST) for each supported access technology. These thresholds are stored within the USIM and define the minimum signal quality required for a network to be considered viable. The OCST settings can be provisioned before deployment or updated later via standard NAS signalling mechanisms, including the Steering of Roaming (SoR) feature.&lt;/p&gt;&lt;p&gt;When a SENSE-enabled UE attempts to select a network, it checks whether the signal level from any candidate network meets or exceeds the configured OCST for its supported radio access technologies. If it does, the UE proceeds to register with that PLMN. If no suitable network meets the signal thresholds, the UE falls back to the legacy selection process, which excludes signal strength as a factor. This dual-iteration method ensures backward compatibility while enabling more robust performance where SENSE is supported.&lt;/p&gt;&lt;p&gt;Additionally, SENSE influences periodic network reselection. If the average signal quality from a registered PLMN drops below the OCST threshold over time, the UE will proactively seek alternative PLMNs whose signals meet the configured criteria. This continuous evaluation helps avoid long-term connectivity issues that may otherwise remain unnoticed.&lt;/p&gt;&lt;p&gt;SENSE is not intended to disrupt roaming steering or PLMN preferences altogether. Instead, it introduces a smart, context-aware filter that empowers the UE to make better decisions when radio conditions are poor. By integrating signal level awareness early in the selection logic, operators gain a powerful new tool to reduce failure rates and minimise costly field maintenance.&lt;/p&gt;&lt;p&gt;As the IoT landscape expands across industries and geographies, features like SENSE will play a vital role in supporting dependable, scalable and autonomous deployments. In Release 18, 3GPP has taken a meaningful step towards improving network availability for devices that need to just work, no matter where they are.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Related Posts&lt;/b&gt;:&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2024/08/3gpp-release-18-description-and-summary.html&quot;&gt;3GPP Release 18 Description and Summary of Work Items&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog - &lt;a href=&quot;https://blog.3g4g.co.uk/2025/04/5g-advanced-store-and-forward-s.html&quot;&gt;5G-Advanced Store and Forward (S&amp;amp;F): Enabling Resilient IoT Communications via Satellite&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2024/11/low-latency-power-saving-with-low-power.html&quot;&gt;Low Latency Power Saving with Low Power-Wake Up Signal/Receiver (LP-WUS/LP-WUR)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2023/07/small-data-transmission-sdt-in-lte-and.html&quot;&gt;Small Data Transmission (SDT) in LTE and 5G NR&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2020/07/mobile-initiated-connection-only-mico.html&quot;&gt;Mobile Initiated Connection Only (MICO) mode in 5G System&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2021/07/introduction-to-5g-reduced-capability.html&quot;&gt;Introduction to 5G Reduced Capability (RedCap) Devices&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2021/10/are-there-50-billion-iot-devices-yet.html&quot;&gt;Are there 50 Billion IoT Devices yet?&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Connectivity Technology Blog: &lt;a href=&quot;https://www.connectivity.technology/2023/07/is-lte-cat-1bis-uniting-fragmented.html&quot;&gt;Is LTE Cat 1bis Uniting the Fragmented Cellular IoT Market?&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Connectivity Technology Blog: &lt;a href=&quot;https://www.connectivity.technology/2022/10/would-nr-light-redcap-succeed-lte-cat.html&quot;&gt;Would NR-Light (RedCap) succeed LTE Cat-1bis and Cat-4 for Internet of Things Devices?&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;</description><link>https://blog.3g4g.co.uk/2025/05/3gpp-release-18-signal-level-enhanced.html</link><author>noreply@blogger.com (Zahid Ghadialy)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4zWHwxsdqZLOAjmb9aZ2nZCs91Em3r2EUJUdsAjCmky5-p1Q9FjxoG8vwvKFzMhFUGHjK97zl9gLkZ6DhVYsKlyXM1Ua2TpW0f0SRUgrH4CiLo149_41SNmPbUF5F1hEHWf2tAz96Oogo9Y0jPPKsHcgviCYfKLdMo64hle4dtW9DttVS3gYzTicN_iE/s72-w640-h360-c/SmartWaterMeter.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1834236085756782640.post-18945778374226550</guid><pubDate>Thu, 24 Apr 2025 06:35:00 +0000</pubDate><atom:updated>2025-04-24T08:36:32.962+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Network Architecture</category><category domain="http://www.blogger.com/atom/ns#">OSS/BSS</category><category domain="http://www.blogger.com/atom/ns#">Tutorials</category><category domain="http://www.blogger.com/atom/ns#">Videos</category><title>An Introduction to OSS/BSS in Mobile Networks</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2MbomJIGQyMjc9qJSyFT07x1JUYJCyc3h4-ksYBu7rBx7uQgfz587SM-svjTXI1KAA63vGI3LBR20stWAuyXUHXaU8qyqLCslZ-w55CMr-o58o4OYiGfSJSDjwDz5U0MAuU8nGxxtNBHQc4cWdac2ggJgCYeweHFqIeuKeIQxqd8VBeq8_BInCguLy6c/s1920/Holistic_View_Network_SupportSystems.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1080&quot; data-original-width=&quot;1920&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2MbomJIGQyMjc9qJSyFT07x1JUYJCyc3h4-ksYBu7rBx7uQgfz587SM-svjTXI1KAA63vGI3LBR20stWAuyXUHXaU8qyqLCslZ-w55CMr-o58o4OYiGfSJSDjwDz5U0MAuU8nGxxtNBHQc4cWdac2ggJgCYeweHFqIeuKeIQxqd8VBeq8_BInCguLy6c/w640-h360/Holistic_View_Network_SupportSystems.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;When discussing mobile networks, much of the focus tends to be on radio access technologies, spectrum, or core network evolution. However, two often overlooked yet critical components in the operational backbone of any telecom network are Operations Support Systems (OSS) and Business Support Systems (BSS).&lt;/p&gt;&lt;p&gt;While not typically defined in 3GPP specifications, OSS and BSS play a vital role in keeping the network functional and the business viable.&lt;/p&gt;&lt;p&gt;OSS is responsible for network-facing tasks such as monitoring, configuration, fault management, and performance optimisation, commonly summarised using the FCAPS model: Fault, Configuration, Accounting, Performance, and Security. It ensures the network operates smoothly and supports the delivery of services.&lt;/p&gt;&lt;p&gt;BSS, on the other hand, deals with customer-facing functions like CRM, order handling, billing, and revenue management. It ensures that customers can purchase, use, and be billed accurately for services,&amp;nbsp; forming the foundation for business growth and customer satisfaction.&lt;/p&gt;&lt;p&gt;To help introduce this important topic, we’ve created a short video explainer that outlines:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;The basic architecture of OSS and BSS&lt;/li&gt;&lt;li&gt;Their roles within a multi-vendor network&lt;/li&gt;&lt;li&gt;Key interfaces such as EMS, NMS, and TMN&lt;/li&gt;&lt;li&gt;Why OSS/BSS are critical for digital transformation and operational efficiency&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The video is embedded below and the slides are available &lt;a href=&quot;https://www.3g4g.co.uk/Training/beginners0048.pdf&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;:&lt;/p&gt;&lt;p&gt;&lt;iframe allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;315&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; src=&quot;https://www.youtube.com/embed/u8aPVe5RDDY?si=ukOIqRs_lTU34Tet&quot; title=&quot;YouTube video player&quot; width=&quot;560&quot;&gt;&lt;/iframe&gt;&lt;/p&gt;&lt;p&gt;While OSS/BSS may not be headline features in 5G or 6G discussions, they remain the unsung heroes that ensure networks are operational, customers are happy, and services are profitable.&lt;/p&gt;&lt;p&gt;Let us know your thoughts in the comments or on social media. We&#39;re always keen to learn from those who work closely with these systems.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Related Posts&lt;/b&gt;:&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;The 3G4G Blog - &lt;a href=&quot;https://blog.3g4g.co.uk/2023/08/tutorial-quick-introduction-to-3gpp.html&quot;&gt;Tutorial: A Quick Introduction to 3GPP&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2024/08/explaining-telecoms.html&quot;&gt;Explaining Telecoms&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2023/09/private-networks-introductory-series.html&quot;&gt;Private Networks Introductory Series&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2024/10/techknowledge-technology-stories-series.html&quot;&gt;TechKnowledge Technology Stories (Series 1)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2021/07/different-types-of-ran-architectures.html&quot;&gt;Different Types of RAN Architectures - Distributed, Centralized &amp;amp; Cloud&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;</description><link>https://blog.3g4g.co.uk/2025/04/an-introduction-to-ossbss-in-mobile.html</link><author>noreply@blogger.com (Zahid Ghadialy)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2MbomJIGQyMjc9qJSyFT07x1JUYJCyc3h4-ksYBu7rBx7uQgfz587SM-svjTXI1KAA63vGI3LBR20stWAuyXUHXaU8qyqLCslZ-w55CMr-o58o4OYiGfSJSDjwDz5U0MAuU8nGxxtNBHQc4cWdac2ggJgCYeweHFqIeuKeIQxqd8VBeq8_BInCguLy6c/s72-w640-h360-c/Holistic_View_Network_SupportSystems.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1834236085756782640.post-1526952884609591454</guid><pubDate>Thu, 17 Apr 2025 06:35:00 +0000</pubDate><atom:updated>2025-04-17T07:58:48.164+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Antennas</category><category domain="http://www.blogger.com/atom/ns#">BT / EE</category><category domain="http://www.blogger.com/atom/ns#">History</category><category domain="http://www.blogger.com/atom/ns#">IET</category><category domain="http://www.blogger.com/atom/ns#">Network Infrastructure</category><category domain="http://www.blogger.com/atom/ns#">UK</category><category domain="http://www.blogger.com/atom/ns#">Videos</category><title>Towers, Masts and Poles: The Backbone of Telecom Infrastructure</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgK25wv3OrFO8NCjL5B6hxpIrWsoywrtxw_0frnMF81XLy7dYUsbu4MIH1FuIE_V5D4cl2-eKTwS10_PPEutPgYow2DuYNmkt4wYIfuNNXT86IXx65sic-fizZR7SGBpm7qXPlrKIGgNRU-zGlwYILOeyrK31v2XfrkA8Pe-w8bPPNMuaDobJwX7Z78FXc/s1920/Towers_Masts_Poles.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1080&quot; data-original-width=&quot;1920&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgK25wv3OrFO8NCjL5B6hxpIrWsoywrtxw_0frnMF81XLy7dYUsbu4MIH1FuIE_V5D4cl2-eKTwS10_PPEutPgYow2DuYNmkt4wYIfuNNXT86IXx65sic-fizZR7SGBpm7qXPlrKIGgNRU-zGlwYILOeyrK31v2XfrkA8Pe-w8bPPNMuaDobJwX7Z78FXc/w640-h360/Towers_Masts_Poles.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;We often walk past them without a second glance—towers, masts, and poles that quietly support the vast web of our modern telecommunications networks. But behind these unassuming structures lies a fascinating history and a critical role in enabling everything from phone calls to television broadcasts.&lt;/p&gt;&lt;p&gt;In a brilliant lecture hosted by the IET, Professor Nigel Linge (with support from Professor Andy Sutton) takes us on a journey through the evolution of telecom infrastructure. Starting from ancient beacons and Napoleonic-era semaphores to the iconic BT Tower and long wave radio transmitters, the talk connects the dots across centuries of innovation.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;blockquote class=&quot;twitter-tweet&quot;&gt;&lt;p dir=&quot;ltr&quot; lang=&quot;en&quot;&gt;On Friday 28th March I delivered a lecture to &lt;a href=&quot;https://twitter.com/hashtag/TheIET?src=hash&amp;amp;ref_src=twsrc%5Etfw&quot;&gt;#TheIET&lt;/a&gt; at Savoy Place in London on the subject of &quot;Telecom Towers, Masts, and Poles&quot;. Celebrating one of the visible faces of the telecoms industry. It was recorded by IETtv and can be viewed here: &lt;a href=&quot;https://t.co/2MULwtRp5x&quot;&gt;https://t.co/2MULwtRp5x&lt;/a&gt; &lt;a href=&quot;https://t.co/aD4cK7zyZU&quot;&gt;pic.twitter.com/aD4cK7zyZU&lt;/a&gt;&lt;/p&gt;— Nigel Linge (@NigelLinge) &lt;a href=&quot;https://twitter.com/NigelLinge/status/1909191146200248615?ref_src=twsrc%5Etfw&quot;&gt;April 7, 2025&lt;/a&gt;&lt;/blockquote&gt; &lt;script async=&quot;&quot; charset=&quot;utf-8&quot; src=&quot;https://platform.twitter.com/widgets.js&quot;&gt;&lt;/script&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The lecture touches on early telegraphy using bare copper wires strung on porcelain insulators, the dawn of voice telephony, Marconi’s pioneering wireless transmissions, and the growth of regional radio and TV broadcasting in the UK. It also highlights how microwave relays and horn-reflector antennas became vital to long-distance communication, with the BT Tower serving as a key hub in the national network.&lt;/p&gt;&lt;p&gt;Whether it’s the humble telegraph pole or the towering masts on hilltops, each structure plays a part in delivering connectivity. This presentation offers a timely reminder of the physical foundations of our digital world—often overlooked, yet essential to our everyday lives.&lt;/p&gt;&lt;p&gt;Watch the full lecture below:&lt;/p&gt;&lt;p&gt;&lt;iframe allowfullscreen=&quot;&quot; height=&quot;310&quot; name=&quot;undefined&quot; src=&quot;https://tv.theiet.org/EmbedPlayer.aspx?videoid=18181&amp;amp;guid=7115502f-d659-4387-8eeb-ba67c1e32c46&quot; width=&quot;550&quot;&gt;&lt;/iframe&gt;&lt;/p&gt;&lt;p&gt;You can also read an article by them detailing many things covered in the lecture &lt;a href=&quot;https://www.cumbria-industries.org.uk/telecommunications/&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;Related Posts:&lt;/h4&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2024/08/explaining-telecoms.html&quot;&gt;Explaining Telecoms&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog -&amp;nbsp;&lt;a href=&quot;https://blog.3g4g.co.uk/2023/08/tutorial-quick-introduction-to-3gpp.html&quot;&gt;Tutorial: A Quick Introduction to 3GPP&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2021/07/the-history-of-camera-phones.html&quot;&gt;The History of Camera Phones&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog - &lt;a href=&quot;https://blog.3g4g.co.uk/2020/01/prof-andy-sutton-backhauling-5g.html&quot;&gt;Prof. Andy Sutton: Backhauling the 5G Experience&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2019/03/a-primer-on-pagers.html&quot;&gt;A Primer on Pagers&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog - &lt;a href=&quot;https://blog.3g4g.co.uk/2018/04/cwheritage-talk-history-of.html&quot;&gt;CWHeritage Talk: The History of Synchronization in Digital Cellular Networks&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2017/04/the-iconic-british-red-phone-boxes.html&quot;&gt;The Iconic British Red Phone Boxes&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2016/06/history-30-years-of-mobile-phone-in-uk.html&quot;&gt;30 years of the mobile phone in the UK&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;</description><link>https://blog.3g4g.co.uk/2025/04/towers-masts-and-poles-backbone-of.html</link><author>noreply@blogger.com (Zahid Ghadialy)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgK25wv3OrFO8NCjL5B6hxpIrWsoywrtxw_0frnMF81XLy7dYUsbu4MIH1FuIE_V5D4cl2-eKTwS10_PPEutPgYow2DuYNmkt4wYIfuNNXT86IXx65sic-fizZR7SGBpm7qXPlrKIGgNRU-zGlwYILOeyrK31v2XfrkA8Pe-w8bPPNMuaDobJwX7Z78FXc/s72-w640-h360-c/Towers_Masts_Poles.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1834236085756782640.post-1943812807018361162</guid><pubDate>Fri, 11 Apr 2025 06:35:00 +0000</pubDate><atom:updated>2025-04-11T08:05:29.562+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">3GPP</category><category domain="http://www.blogger.com/atom/ns#">ETSI</category><category domain="http://www.blogger.com/atom/ns#">Standards</category><category domain="http://www.blogger.com/atom/ns#">Videos</category><title>Understanding ETSI’s Industry Specification Groups (ISGs) and Why They Matter</title><description>&lt;p&gt;The European Telecommunications Standards Institute (ETSI) is a leading standards development organisation (SDO) recognised for producing globally applicable standards for ICT, including fixed, mobile, radio, converged, broadcast, and internet technologies. Based in Europe but with worldwide influence, ETSI provides an open and inclusive environment for industry players to collaborate on the development of future technologies.&lt;/p&gt;&lt;p&gt;A recent overview presentation of ETSI by Jan Ellsberger, ETSI&#39;s Director General, is available on the 3GPP website &lt;a href=&quot;https://www.3gpp.org/ftp/Information/presentations/Presentations_2024/01_ETSI.pdf&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEht8RBlQQKPwXLxWjaRBgDjeB65O39z71iPWtrULiLgHZMuRbo8Q4qfCOqc93DJ-rfX4N7jAstRI80esEyorPcthu-BRIw6w38QpSU24ZJC7OFlUXM2_II0G94w_xNqpW8G4BRrrcv0JiSkXmx4ArWcEQEe2xbgH9F-4J3zTf2xW1iTGXp50gqlBuo6gv8/s1920/ETSI_TechnicalBodies_2024.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1080&quot; data-original-width=&quot;1920&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEht8RBlQQKPwXLxWjaRBgDjeB65O39z71iPWtrULiLgHZMuRbo8Q4qfCOqc93DJ-rfX4N7jAstRI80esEyorPcthu-BRIw6w38QpSU24ZJC7OFlUXM2_II0G94w_xNqpW8G4BRrrcv0JiSkXmx4ArWcEQEe2xbgH9F-4J3zTf2xW1iTGXp50gqlBuo6gv8/w640-h360/ETSI_TechnicalBodies_2024.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;ETSI&#39;s Industry Specification Groups (ISGs) are collaborative groups formed within ETSI to address emerging and often pre-standardisation topics in a flexible, fast, and open manner. They provide a platform for industry players, including companies, research organisations, and other stakeholders, to work together on technical specifications outside the constraints of formal standardisation processes.&lt;/p&gt;&lt;p&gt;Key Features of ISGs include:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Focus on innovation&lt;/b&gt;: ISGs often tackle new or rapidly evolving technologies, such as Network Functions Virtualisation (NFV), Quantum Key Distribution (QKD), and AI.&lt;/li&gt;&lt;li&gt;&lt;b&gt;Open participation&lt;/b&gt;: Participation is open to ETSI members and non-members, although non-members pay a fee.&lt;/li&gt;&lt;li&gt;&lt;b&gt;Faster timelines&lt;/b&gt;: ISGs are designed to deliver results quickly, often within 12–24 months, making them well-suited for fast-moving domains.&lt;/li&gt;&lt;li&gt;&lt;b&gt;Flexible structure&lt;/b&gt;: They are less formal than ETSI Technical Committees, which allows more agile collaboration.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxJFJSQHztY1WH6gRiizDOoS6OkY79rOszRzXNR9GfFQq4PPJK4UEBuxHhhh5r3vyEuA_FWqyf5ZV3_lOFsNiqdOKwE_ZuRcj_zQIegjZWRvCj6B-59orN9Mw61REiqmugoX8DISpNmk-bYgAcSI686ST9svEYsHh_qbq4D92MDYIFFhm513ofYm_E5Gg/s1920/ETSI_ISGs_2025.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1080&quot; data-original-width=&quot;1920&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxJFJSQHztY1WH6gRiizDOoS6OkY79rOszRzXNR9GfFQq4PPJK4UEBuxHhhh5r3vyEuA_FWqyf5ZV3_lOFsNiqdOKwE_ZuRcj_zQIegjZWRvCj6B-59orN9Mw61REiqmugoX8DISpNmk-bYgAcSI686ST9svEYsHh_qbq4D92MDYIFFhm513ofYm_E5Gg/w640-h360/ETSI_ISGs_2025.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;ISGs produce documents such as:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Group Specifications (GS)&lt;/b&gt; – technical specifications that can later be taken up by formal standardisation bodies.&lt;/li&gt;&lt;li&gt;&lt;b&gt;Group Reports (GR)&lt;/b&gt; – informative reports including use cases, frameworks, or recommendations.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;ISGs help shape the direction of future standards and industry practices by offering an open, collaborative environment for technical consensus. They often bridge the gap between research and standardisation.&lt;/p&gt;&lt;p&gt;Dr Howard Benn, a mobile industry veteran with contributions spanning from GSM to 5G, has created a short video on ETSI’s ISGs, embedded below:&lt;/p&gt;&lt;p&gt;&lt;iframe width=&quot;560&quot; height=&quot;315&quot; src=&quot;https://www.youtube.com/embed/t9IH4vLKa_E?si=E99TiTbCG8LP6FIO&quot; title=&quot;YouTube video player&quot; frameborder=&quot;0&quot; allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; allowfullscreen&gt;&lt;/iframe&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;Related Posts&lt;/b&gt;:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;The 3G4G Blog - &lt;a href=&quot;https://blog.3g4g.co.uk/2025/03/aiml-in-3gpp-progress-challenges-and.html&quot;&gt;AI/ML in 3GPP: Progress, Challenges, and the Road to 6G&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2023/11/etsi-security-conference-2023.html&quot;&gt;Presentations from ETSI Security Conference 2023&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog - &lt;a href=&quot;https://blog.3g4g.co.uk/2023/04/etsis-summit-on-sustainability-ict.html&quot;&gt;ETSI&#39;s Summit on Sustainability: ICT Standards for a Greener World&lt;/a&gt;&lt;/li&gt;&lt;li&gt;3G4G: &lt;a href=&quot;https://www.3g4g.co.uk/Training/beginners0016.html&quot;&gt;An Quick Introduction to 3GPP&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;</description><link>https://blog.3g4g.co.uk/2025/04/understanding-etsis-industry.html</link><author>noreply@blogger.com (Zahid Ghadialy)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEht8RBlQQKPwXLxWjaRBgDjeB65O39z71iPWtrULiLgHZMuRbo8Q4qfCOqc93DJ-rfX4N7jAstRI80esEyorPcthu-BRIw6w38QpSU24ZJC7OFlUXM2_II0G94w_xNqpW8G4BRrrcv0JiSkXmx4ArWcEQEe2xbgH9F-4J3zTf2xW1iTGXp50gqlBuo6gv8/s72-w640-h360-c/ETSI_TechnicalBodies_2024.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1834236085756782640.post-6892788667116048087</guid><pubDate>Tue, 01 Apr 2025 06:35:00 +0000</pubDate><atom:updated>2025-04-01T07:35:00.127+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">3GPP</category><category domain="http://www.blogger.com/atom/ns#">5G</category><category domain="http://www.blogger.com/atom/ns#">5G-Advanced</category><category domain="http://www.blogger.com/atom/ns#">Ericsson</category><category domain="http://www.blogger.com/atom/ns#">Internet of Things</category><category domain="http://www.blogger.com/atom/ns#">Release 19</category><category domain="http://www.blogger.com/atom/ns#">Satellite Communications</category><title>5G-Advanced Store and Forward (S&amp;F): Enabling Resilient IoT Communications via Satellite</title><description>&lt;h3 style=&quot;text-align: left;&quot;&gt;Introduction&lt;/h3&gt;&lt;p&gt;As the deployment of 5G networks continues to expand globally, the industry is already looking ahead to enhance capabilities through 5G-Advanced features. Among these innovations is the &quot;Store and Forward&quot; (S&amp;amp;F) functionality for Non-Terrestrial Networks (NTN), which represents a significant advancement for IoT applications utilizing satellite connectivity. This feature, specified in 3GPP Release 19, addresses one of the key challenges in satellite communications: maintaining service continuity during intermittent feeder link connectivity.&lt;/p&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;What is Store and Forward?&lt;/h3&gt;&lt;p&gt;Store and Forward (S&amp;amp;F) satellite operation is designed to provide communication services for User Equipment (UE) under satellite coverage without requiring a simultaneous active feeder link connection to the ground segment. This capability is particularly relevant for delay-tolerant IoT services utilizing Non-Geostationary Orbit (NGSO) satellites.&lt;/p&gt;&lt;p&gt;In simple terms, S&amp;amp;F enables satellites to:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Collect data from IoT devices when they&#39;re in range&lt;/li&gt;&lt;li&gt;Store this data onboard the satellite&lt;/li&gt;&lt;li&gt;Forward the data to ground stations only when a connection becomes available&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;This approach fundamentally differs from traditional satellite operations, which require end-to-end connectivity at the moment of transmission.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3qqRDMs5APcU5gwoOEK2oWiRUCKrIpKLEd0r9ShB76H9EU_tCKWbWMTqfbeJkUuBhsp3vnGhLv-h242iWgo6TwE3OllU8U6kHGIG250_9o7aVdENM9L_KXRTzQfo0Oh9_S4fPAtGppOQkqpsvtSiE5txS3H9WYtZxBYeGj32l6EJh7LPQ_mHWw1q8nc0/s1077/5GSystem_StoreAndForwardSatelliteOperation.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1077&quot; data-original-width=&quot;1031&quot; height=&quot;640&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3qqRDMs5APcU5gwoOEK2oWiRUCKrIpKLEd0r9ShB76H9EU_tCKWbWMTqfbeJkUuBhsp3vnGhLv-h242iWgo6TwE3OllU8U6kHGIG250_9o7aVdENM9L_KXRTzQfo0Oh9_S4fPAtGppOQkqpsvtSiE5txS3H9WYtZxBYeGj32l6EJh7LPQ_mHWw1q8nc0/w612-h640/5GSystem_StoreAndForwardSatelliteOperation.jpg&quot; width=&quot;612&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;b&gt;Source&lt;/b&gt;:&amp;nbsp;&lt;a href=&quot;https://www.3gpp.org/ftp/Specs/archive/22_series/22.865&quot; target=&quot;_blank&quot;&gt;3GPP TR 22.865&lt;/a&gt;: Technical Specification Group Services and System Aspects; Study on satellite access Phase 3;&lt;/span&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;Normal Operation vs. Store and Forward&lt;/h3&gt;&lt;p&gt;To understand the significance of S&amp;amp;F, it&#39;s important to contrast it with the &quot;normal/default satellite operation&quot; mode:&lt;/p&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;Normal/Default Satellite Operation&lt;/h4&gt;&lt;p&gt;In the traditional model, signalling and data traffic exchange between a UE with satellite access and the ground network requires both service and feeder links to be active simultaneously. This creates a continuous end-to-end connectivity path between the UE, satellite, and ground network.&lt;/p&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;Store and Forward Operation&lt;/h4&gt;&lt;p&gt;Under S&amp;amp;F operation, the end-to-end exchange of signalling/data traffic is handled as a two-step process that doesn&#39;t need to occur concurrently:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Step A&lt;/b&gt;: Signalling/data exchange between the UE and satellite takes place even without the satellite being connected to the ground network. The satellite operates the service link without an active feeder link connection, collecting and storing data from IoT devices.&lt;/li&gt;&lt;li&gt;&lt;b&gt;Step B&lt;/b&gt;: Later, when connectivity between the satellite and ground network is established, the stored communications are transmitted to the ground network.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;This approach bears similarities to existing store-and-forward services like SMS, where end-to-end connectivity between endpoints isn&#39;t required simultaneously.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiaSSnVGzwYAzZLJ03DadBc2tRmAu1waWPjKzxI0dJlSR6Xjy5T5bUWnanrqojGfYiljOoNObsODxDvxQhPuqkrOusdpzZgOkZKH1knn2dCZ_1c1XbX136fTeTCeEwnQQISjhrqY-dIw87LdHAiK9lk_vhTEjJnbA4-yzw0Qo7EcH1KsYfnh6STpkYdua8/s1920/EricssonTechnicalReview_TransparentAndRegenerativePayload.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1080&quot; data-original-width=&quot;1920&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiaSSnVGzwYAzZLJ03DadBc2tRmAu1waWPjKzxI0dJlSR6Xjy5T5bUWnanrqojGfYiljOoNObsODxDvxQhPuqkrOusdpzZgOkZKH1knn2dCZ_1c1XbX136fTeTCeEwnQQISjhrqY-dIw87LdHAiK9lk_vhTEjJnbA4-yzw0Qo7EcH1KsYfnh6STpkYdua8/w640-h360/EricssonTechnicalReview_TransparentAndRegenerativePayload.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;b&gt;Source&lt;/b&gt;: &lt;a href=&quot;https://www.ericsson.com/en/blog/2024/10/ntn-payload-architecture&quot; target=&quot;_blank&quot;&gt;Ericsson Blog&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;Technical Requirements for Store and Forward&lt;/h3&gt;&lt;p&gt;The implementation of S&amp;amp;F relies heavily on regenerative satellite payloads, as opposed to transparent payloads. Here&#39;s why this distinction matters:&lt;/p&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;Regenerative Payload Advantages&lt;/h4&gt;&lt;p&gt;A regenerative payload with an onboard gNB (next-generation NodeB) offers several critical capabilities:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Onboard Processing&lt;/b&gt;: The ability to process and store data directly on the satellite&lt;/li&gt;&lt;li&gt;&lt;b&gt;Reduced Dependency&lt;/b&gt;: Less reliance on continuous ground segment connectivity&lt;/li&gt;&lt;li&gt;&lt;b&gt;Enhanced Resilience&lt;/b&gt;: The NTN can function even if the feeder link is temporarily severed&lt;/li&gt;&lt;li&gt;&lt;b&gt;Performance Improvements&lt;/b&gt;: Significant reductions in roundtrip time for all procedures between the gNB and UE&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;For S&amp;amp;F functionality, all or part of the core network functions must be placed on the satellite together with the gNB. This architectural change enables a new level of autonomous operation for satellite networks.&lt;/p&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;Applications for IoT&lt;/h3&gt;&lt;p&gt;The Store and Forward capability is especially suited for delay-tolerant or non-real-time IoT applications. Examples include:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Environmental Monitoring&lt;/b&gt;: Collecting sensor data from remote locations&lt;/li&gt;&lt;li&gt;&lt;b&gt;Asset Tracking&lt;/b&gt;: Monitoring the status of assets in transit through areas with limited ground infrastructure&lt;/li&gt;&lt;li&gt;&lt;b&gt;Agricultural Sensing&lt;/b&gt;: Gathering data from widely distributed sensors in rural areas&lt;/li&gt;&lt;li&gt;&lt;b&gt;Maritime and Offshore IoT&lt;/b&gt;: Supporting connected devices at sea where direct connectivity to ground networks is inconsistent&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;These use cases benefit from S&amp;amp;F&#39;s ability to ensure data is eventually delivered without requiring constant connectivity, which is particularly valuable for battery-powered IoT devices that need to conserve energy.&lt;/p&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;Relationship to Delay-Tolerant Networking&lt;/h3&gt;&lt;p&gt;The concept of Store and Forward is well-established in delay-tolerant networking (DTN) and disruption-tolerant networking domains. These networking paradigms are designed to work in challenged environments where conventional protocols may fail due to long delays or frequent disruptions.&lt;/p&gt;&lt;p&gt;In the 3GPP context, S&amp;amp;F can be compared to SMS service, which doesn&#39;t require end-to-end connectivity between endpoints but only between the endpoints and the Short Message Service Centre (SMSC), which acts as an intermediate node handling storage and forwarding.&lt;/p&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;Future Implications&lt;/h3&gt;&lt;p&gt;The introduction of S&amp;amp;F functionality represents an important step toward what &lt;a href=&quot;https://www.ericsson.com/en/blog/2024/10/ntn-payload-architecture&quot; target=&quot;_blank&quot;&gt;Ericsson&lt;/a&gt; has called &quot;data centers in the sky.&quot; By placing not just radio access network functions but also core network capabilities in space, we&#39;re moving toward satellite networks that can operate with greater autonomy and resilience.&lt;/p&gt;&lt;p&gt;This development also aligns with broader industry efforts to create truly global coverage through integrated ground and space networks. Combined with inter-satellite links (ISL), S&amp;amp;F enables more flexible and resilient network architectures that can maintain service even when individual links are unavailable.&lt;/p&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;Conclusion&lt;/h3&gt;&lt;p&gt;Store and Forward represents a significant advancement in 5G-Advanced satellite communications, particularly for IoT applications. By decoupling the timing requirements between service link and feeder link communications, S&amp;amp;F enables more resilient, energy-efficient, and cost-effective deployment of IoT devices in remote or challenging environments.&lt;/p&gt;&lt;p&gt;As 3GPP Release 19 specifications continue to develop, we can expect to see this capability integrated into commercial satellite IoT offerings, expanding the reach of 5G networks to truly global coverage. While initially targeted at IoT applications, the architectural principles of S&amp;amp;F could eventually extend to other services, bringing us closer to ubiquitous connectivity across terrestrial and non-terrestrial networks.&lt;/p&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;Related Posts&lt;/h3&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2024/12/tutorial-session-on-non-terrestrial.html&quot;&gt;Tutorial Session on Non-Terrestrial Networks (NTNs) and 3GPP Standards from 5G to 6G&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Connectivity Technology Blog: &lt;a href=&quot;https://www.connectivity.technology/2024/12/tutorial-session-on-current-trends-and.html&quot;&gt;Tutorial Session on Current Trends and Key Challenges of Satellite communications&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Free 6G Training: &lt;a href=&quot;https://www.free6gtraining.com/2024/04/atis-webinar-on-introduction-to-3gpp.html&quot;&gt;ATIS Webinar on &#39;Introduction to 3GPP Release 19 and 6G Planning&#39;&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2024/11/low-latency-power-saving-with-low-power.html&quot;&gt;Low Latency Power Saving with Low Power-Wake Up Signal/Receiver (LP-WUS/LP-WUR)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2023/07/small-data-transmission-sdt-in-lte-and.html&quot;&gt;Small Data Transmission (SDT) in LTE and 5G NR&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2023/06/3gpp-tsg-ran-and-tsg-sa-release-19.html&quot;&gt;3GPP TSG RAN and TSG SA Release-19 Workshop Summary&lt;/a&gt;&lt;/li&gt;&lt;li&gt;The 3G4G Blog: &lt;a href=&quot;https://blog.3g4g.co.uk/2021/10/are-there-50-billion-iot-devices-yet.html&quot;&gt;Are there 50 Billion IoT Devices yet?&lt;/a&gt;&lt;/li&gt;&lt;li&gt;3G4G: &lt;a href=&quot;https://www.3g4g.co.uk/Training/beginners0016.html&quot;&gt;An Quick Introduction to 3GPP&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;</description><link>https://blog.3g4g.co.uk/2025/04/5g-advanced-store-and-forward-s.html</link><author>noreply@blogger.com (Zahid Ghadialy)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3qqRDMs5APcU5gwoOEK2oWiRUCKrIpKLEd0r9ShB76H9EU_tCKWbWMTqfbeJkUuBhsp3vnGhLv-h242iWgo6TwE3OllU8U6kHGIG250_9o7aVdENM9L_KXRTzQfo0Oh9_S4fPAtGppOQkqpsvtSiE5txS3H9WYtZxBYeGj32l6EJh7LPQ_mHWw1q8nc0/s72-w612-h640-c/5GSystem_StoreAndForwardSatelliteOperation.jpg" height="72" width="72"/><thr:total>0</thr:total></item></channel></rss>