ChannelLife Australia logo
Industry insider news for Australia's technology resellers
Story image

Will 2019 be the year of network evolution?

By Contributor
Wed 16 Jan 2019
FYI, this story is more than a year old

Article by A10 Networks EMEA director Ronald Sens

With 2019 well underway, the hype of 5G and the growth of IoT are filling my thoughts, with both - especially the fifth generation of mobile networks - in a relatively early stage. So, how will 5G and IoT develop in the New Year?

First operational 5G networks

This year is expected to see the first operational 5G networks become available in selected areas. However, the iteration of mobile network technology won’t fully replace existing 3G and 4G networks, leaving many of us questioning what 5G’s real benefits will be, and how much extra will it cost? 

As previously, when new generations of networks have been introduced, 5G will need to coexist with existing networks to support all subscribers and the broad diversity of the installed base. 

This presents an opportunity for service providers to review and adjust their strategy, based on lessons learned during the earlier deployments of what worked best for their customers.

Radio access networks continue to evolve

This evolution will drive increasingly flexible deployment options. Associated methods of support will be based on Software Defined Networks (SDN), or as some call it ‘self-driven networks’, using a mix of Virtualised Network Functions (VNF). This evolution of legacy hardware into software-defined functions continues the development of architectural changes.

In many instances the architectural focus is on the balance of two things:

  • How to best utilise more of the common platforms to help drive down the overall deployment costs tied to new technology, and
  • The associated performance the newer and faster dedicated hardware brings to the equation.

Network operations continue to evolve

More hardware will be needed to handle the adoption of SDN and VNF. This will drive even more network advancements that will then require even more software. The continued cyclic evolution and shift to a more rapid deployment will drive an increasing need for DevOps. 

Expect to hear more about Continuous Integration and Continuous Delivery, concepts that have gained attention in the development of cloud.

The development and integration of complexities will increase operational overhead before simplifications of networks can start to be realised. The operational complexities, if not managed through self-healing and the use of intelligence, could delay uptake as the evolution of network operations is just as important as the network itself. 

Virtualisation continues to evolve

Last year saw many of the service providers focus more effort on investing in resources as the shift from “old iron” to the more flexible virtualised environments hastened. The shift is part of the bigger movement associated with decentralisation, consisting of deploying smaller but more capable systems to handle the increasing traffic. 

This is not a new trend as network tonnage continues to grow no matter what kind of carrier is supporting it. The tonnage increase continues as more and more devices become available and this becomes the basis for the Internet of Things (IoT).

5G network continues to scale out

As 2019 progresses, subscribers will see 5G progress from conversation to actually supporting a limited quantity of customers. Mobile subscribers will need to obtain new devices. The work done by RAN and RF manufacturers will move from prototypes into commercial products at an increasing pace.

Hardware v software

5G drives increasing scale throughout all parts of a network, at the same time changing to decentralise many components of the infrastructure. The decentralisation is forcing trade-offs between high-performance purpose-built hardware and the use of software-defined solutions.

The trade-offs and costs will remain hot topics for years to come as custom hardware remains a leader in many instances. Virtualisation will move further ahead into containers and orchestrations to knit cooperative suppliers into a cohesive scaled solution.

Radio spectrum and government regulations

Talks regarding radio spectrum, who has what frequencies, and how they should be used, will keep governments around the world occupied. Wi-Fi offload and interconnects between public and private networks will continue to improve coverage.

The story of wireless mobility coverage will be a very interesting topic to watch unfold. 5G deployment topologies will fight to cover every inch of the major populations. Rural areas will have the most to gain.

Subscriber growth slows, connected devices increases

Subscriber counts will not go up as much as in years past. Saturation of connected individuals is reaching an all-time high although the count of connected devices will increase at a more rapid pace, as the IoT expands.

DDoS attacks grow in frequency and size

With the increase of IoT, DDoS attacks will grow in frequency and scale. More devices going on-line places even more pressure on service providers to increase their ability to combat DDoS attacks.

Mobile micro-clouds in containers

Look for the development of small cloud data centers located at the edge of the internet, also known as cloudlets or mobile micro-clouds. This ‘edge’ or ‘fog’ computing model is an extension of existing cloud infrastructure. They will improve the latency of services for mobile devices.

The adoption of 5G creates the demand to offload resource-intensive services to the network’s edge. Cloudlet deployments will have to be very agile, so they can be quickly provisioned to adapt to a rapidly changing market. Because of this, they’ll be based in the container architecture.

As the network model evolves, so too do the opportunities for innovation and threats from disruptors. 2019 promises to be yet another fascinating year in the network world.

Related stories
Top stories
Story image
Tech job moves - Forcepoint, Malwarebytes, SolarWinds & VMware
We round up all job appointments from May 13-20, 2022, in one place to keep you updated with the latest from across the tech industries.
Story image
Vectra AI
Understanding the weight on security leader’s shoulders, and how to shift it
Millions of dollars of government funding and internal budgets are being funnelled into cybersecurity to build resilience against sophisticated threats, indicating how serious this issue has become.
Story image
Telstra enters into new RSP agreement with Opticomm
Telstra has entered into an RSP agreement with Opticomm (A Uniti Group Limited subsidiary) to provide network fibre services to customers.
Story image
Alarming surge in Conti Ransomware Group activity - report
A new report has identified a 7.6 per cent increase in the number of vulnerabilities tied to ransomware in Q1 2022.
Story image
Fortinet's Security Fabric hits new record for integrations
The Fortinet Security Fabric has surpassed 500 technology integrations with more than 300 Fabric-Ready Technology Alliance Partners.
Story image
Decision Inc. Australia enters partnership with Alteryx
Independent data and analytics consultancy Decision Inc. Australia has partnered with automated analytics company Alteryx, expanding its offering to clients.
Story image
Tyson Beckford partners with Element Case on new AppleWatch band
Celebrity Tyson Beckford has collaborated with STM Brands' Element Case brand to create a rugged new accessory.
Story image
The 'A-B-C' of effective application security
Software applications have been a key tool for businesses for decades, but the way they are designed and operated has changed during the past few years.
Story image
Amazon Web Services / AWS
RedShield leverages AWS to scale cybersecurity services
"Working with AWS gives RedShield the ability to mitigate significant application layer DDoS attacks, helping leaders adopt best practices and security architectures."
Story image
Remote Working
Australia’s remote workers face connectivity and security issues
SOTI's new report finds better video conferencing technology and improved security measures are top concerns for remote workers in Australia.
Story image
Application Performance Monitoring / APM
Why SolarWinds Partners will have big wins in 2022
We summarise the key recent changes that the monitoring software vendor has made to accelerate its channel business.
Story image
Digital Transformation
Pluralsight and Ingram Micro Cloud team up on cloud initiative
Pluralsight has teamed with Ingram Micro Cloud to build upon cloud competence and maturity internally, and externally support partners’ capabilities.
Story image
Nozomi Networks
Nozomi Networks, Siemens reveal software integration
Nozomi Networks and Siemens have extended their partnership by embedding Nozomi Networks’ software into the Siemens Scalance LPE local processing engine.
Story image
Hard numbers: Why ambiguity in cybersecurity no longer adds up
As cybersecurity costs and risks continue to escalate, CEOs continue to struggle with what their investment in cyber protection buys. Getting rid of ambiguity becomes necessary.
Story image
Cybersecurity starts with education
In 2021, 80% of Australian organisations responding to the Sophos State of Ransomware study reported being hit by ransomware. 
Story image
New digital traffic light system to tackle construction defects
Smarter Defects Management launches its PaaS digital system and says it will revolutionise managing defects in the construction industry.
Story image
PNY launches XLR8 Gaming EPIX memory products in A/NZ
PNY has launched its XLR8 Gaming EPIC-X RGB™ DDR4 Silver 3200MHz and 3600MHz memory products in Australia and New Zealand.
Story image
Legrand unveils Nexpand, a data center cabinet platform
Legrand has unveiled a new data center cabinet platform, Nexpand, to offer the necessary scalability and future-proof architecture for digital transformation.
Story image
Google and CSIRO use AI to help protect the Great Barrier Reef
Google has partnered with CSIRO in Australia to implement AI solutions that help protect the Great Barrier Reef.
Story image
Data Protection
Barracuda launches new capabilities for API Protection
"Every business needs this type of critical protection against API vulnerabilities and automated bot attacks," Barracuda says.
Story image
Digital Transformation
How to modernise legacy apps without compromising security
At a time when digital transformation has become central to business, even the most important applications come with a ‘use-by’ date.
Story image
Telstra, Google and Accenture launch 5G AR experience for AFL
Telstra, Google and Accenture are developing a new 5G powered augmented reality (AR) experience at Melbourne's Marvel Stadium for the footy season.
Story image
Sift shares crucial advice for preventing serious ATO breaches
Are you or your business struggling with Account Takeover Fraud (ATO)? One of the latest ebooks from Sift can provide readers with the tools and expertise to help launch them into the new era of account security.
Story image
Artificial Intelligence
AI-based email security platform Abnormal Security valued at $4B
"A new breed of cybersecurity solutions that leverage AI is required to change the game and stop the rising threat of sophisticated and targeted email attacks."
Story image
Application Security
What are the DDoS attack trend predictions for 2022?
Mitigation and recovery are vital to ensuring brand reputation remains solid in the face of a Distributed Denial of Service (DDoS) attack and that business growth and innovation can continue.
Story image
Hands-on review: Technics EAH-A800 Noise Cancelling Wireless Headphones
Designed in Osaka, Japan, these headphones just exude quality. They aren’t heavy, but they feel well built and solid.
Story image
Airwallex launches new bank feed integration with NetSuite
Airwallex has launched a new bank feed integration with NetSuite, developed in partnership with NetSuite solution partner, Onlineone.
Story image
Lightspeed launches all-in-one marketing platform in A/NZ
ECommerce provider, Lightspeed has launched a new all-in-one marketing solution, Lightspeed Marketing & Loyalty in Australia and New Zealand.
Story image
A third of companies paying ransom don’t recover data - report
Veeam's report finds 76% of businesses who are victims of cyberattacks paid the ransom to recover data, but a third were still unable to get their information back.
Story image
Data solutions
South Australia state satellite makes significant progress
South Australia’s first state satellite has successfully completed the Critical Design Review (CDR), moving it closer to providing tangible data solutions.
Story image
WolfVision announces new range of visualisers
WolfVision has announced a new range of visualisers to help meet multiple industry demands for remote learning and educational solutions.
Story image
Cradlepoint expands its Cellular Intelligence capabilities
Cradlepoint has announced additional Cellular Intelligence capabilities with its NetCloud service.
Story image
Artificial Intelligence
SAS announces new products amid cloud portfolio success
Analytics and AI company SAS is deepening its broad industry portfolio with offerings that support life sciences, energy, and martech.
Story image
BlackBerry offers Kaspersky replacement cybersecurity for the channel
BlackBerry advises that users of Kaspersky software in Australia and New Zealand undertake a rigorous risk analysis of their current security posture.
Story image
Managed service providers: effective scoping to avoid costly vendor pitfalls
Managed security services are outsourced services focusing on the security and resilience of business networks.
Story image
Motorola Solutions acquires Videotec S.p.A for security portfolio
Motorola Solutions has acquired Italian ruggedised video security company Videotec S.p.A, along with its portfolio of highly versatile cameras.
Story image
ChildFund launches new campaign to protect children online
ChildFund says WEB Safe & Wise aims to protect children from sexual exploitation and abuse online while also empowering them to become digitally savvy. 
Story image
Infoblox's State of Security Report spotlights Australian remote work hazards
Attackers exploit weak WiFi, remote endpoints, and the cloud, costing 50% of organisations over $1.3 million in breach damages.
Story image
Hands-on review: WD_Black SN770 NVMe SSD Game Drive
Western Digital expands its WD_Black range of NVMe solid-state drives with the WD_Black SN770 Game Drive.
Story image
9/10 Aussies to stop spending if personal data compromised
"Based on the patterns we are seeing among Australian consumers, it is evident that trust in a brand is exceptionally important."
Story image
HINDSITE wins Aerospace Xelerated Pitch Challenge with solution to support Boeing
Brisbane-based startup HINDSITE was the winner of the first ever Pitch Challenge organised by Aerospace Xelerated in partnership with Queensland XR Hub. 
Story image
Cloud Security
Aqua Security createa unified scanner for cloud native security
“By integrating more cloud native scanning targets into Trivy, such as Kubernetes, we are simplifying cloud native security."
Story image
Apple previews new features for users with disabilities
Apple says new software features that offer users with disabilities new tools for navigation, health and communication, are set to come out later this year.
Story image
Artificial Intelligence
SAS launches human-focused responsible innovation initiative
SAS has launched a responsible innovation initiative, furthering its commitment to equity and putting people first.