YOU ARE AT:Opinion2015 Predictions: Mobility in 2015 and beyond

2015 Predictions: Mobility in 2015 and beyond

Wi-Fi/LTE integration, security, cloud set to impact mobility in 2015

Subscribers are using 4G LTE networks and consuming wireless data 14-times more than on non-4G networks, according to a recent Cisco Systems study. Today, a multitude of applications and devices are available to consume the mobile network, and service providers are challenged to deliver capabilities to meet subscriber expectations for access, availability and security. Wearables and smartphones will continue to flourish in 2015, meaning that advances in wireless LTE traffic management are top priorities for service providers.

Consumers have a voracious appetite and are adopting mobile technology trends with abandon. Two examples of advanced connectivity technologies are Bluetooth LE, which connects devices to a user’s personal network and the Internet, and near field communication, which now lets consumers use their smartphones to pay for purchases at the register.

Three key trends can help service providers deliver the technology to satisfy consumers’ ever-growing desire for mobile data.

Standardization and interoperability across Wi-Fi and LTE networks
Due to the increased performance of LTE and Wi-Fi networks, people are using their mobile devices to access content that was traditionally only accessed on high-speed broadband networks. Video streaming, social media and business applications are being accessed on mobile networks regularly due to the availability of high-speed mobile services via Wi-Fi and LTE. Consumers generally do not care about how the application is accessed as long as it is available.

Service providers need to integrate Wi-Fi and LTE access to provide a unified and transparent model for mobile connectivity. Unified authentication, security and reliability are all essential features subscribers expect with their mobile access. Such requirements become even more important as service providers deliver voice-over-LTE services and replace older circuit-switched voice services.

Mobile service providers will adopt a new security vision: multi-layer, “dynamic” security
The introduction of high-speed LTE mobile networks also brought a major change in network design. Because LTE networks are based on IP technology, they are vulnerable to all IP threats and security concerns of IP networks. New hacks and compromises are in the news on a daily basis, since hackers can penetrate a mobile network within a matter of days, if not hours, if it is not properly protected.What’s worse is that it may take months or longer to detect the hack or vulnerability.

To mitigate such threats, service providers need to create a dynamic, multilayer security policy that can deliver real-time detection and adjust security policies appropriately in multiple parts of the network. It is no longer feasible for them to protect their infrastructures using perimeter firewalls. As networks evolve toward virtualized environments with network function virtualization and software-defined networking, security must be applied based on application and service availability, not static network topology. Security management must incorporate the detection and corresponding mitigation by applying dynamic policies that can be delivered throughout disparate components within the LTE infrastructure.

The rise of the secure, programmable and mobile hybrid cloud
Subscribers are using the mobile network for business purposes as well as personal consumption. With the constant explosion of data and the pressure to reduce costs, enterprises will be forced to consider the public cloud option; however, reliability and security for mission critical applications remain a concern. Businesses are expecting their employees to be able to access their applications and data even when they are not in the office.

We expect to see more enterprises adopt cloud deployments, especially as hybrid models offer secure, orchestrated, programmable clouds. Hybrid models also enable enterprises to take advantage of their in-house expertise. The potential lack of control over security and reliability in the public cloud, however, means that not all applications and data will be placed there. Some sensitive and mission-critical applications will stay within a private cloud infrastructure. That means businesses will need to work with service providers to create hybrid clouds to deliver certain services and productivity applications through the mobile network.

“The Times They Are A-changin’ “
To paraphrase what Bob Dylan wrote and sang, mobile networks are changing. Access is becoming ubiquitous and, with the speed and availability that mobile networks deliver, even has the potential to replace our traditional fixed-line physical-access models. There is a trend toward more advanced smartphones with their ever-growing data consumption requirements. We are also seeing the development of the “Internet of Things” where any and all devices will have Internet connectivity. This means service providers must continue to adapt and evolve their networks to support the evolution of mobile access.

Come gather ‘round people
Wherever you roam
And admit that the waters
Around you have grown
–Bob Dylan

Editor’s Note: With 2015 now upon us, RCR Wireless News has gathered predictions from leading industry analysts and executives on what they expect to see in the new year.

ABOUT AUTHOR