Overlooked costs can quickly dwarf capital costs. Total-cost-of-ownership is the key metric to determine the true cost of network. See how one wireless network operator uses TCO to measure and control network costs.Request Case Study
Some multi-box Multi-Band solutions currently available on the market fail to provide a seamless switchover between the traditional microwave and E-band frequencies when the E-band portion becomes unavailable—leading to reduced capacity and the need for manual intervention to correct the link’s performance. Continue reading
Most radio buying processes haven’t changed for years. Some orders are still placed by picking up the phone, emailing a request, waiting for a response, and then juggling multiple POs. It’s such a long process to manage from start to finish. Aviat Store solves all those issues and more. Continue reading
By Said Jilani, Sr Customer Solutions Architect
Segment Routing is a new routing paradigm that aims to optimize, simplify, and improve the scalability of IP/MPLS based networks. Segment Routing utilizes source-based routing scheme where a network node steers a packet based on a list of instructions carried in the packet header (called “segments”). The list of segments carried in the packet header provide a strict or a loose specification of the required network path or tunnel eliminating the need for transit nodes to hold and maintain that path/tunnel information. Continue reading
For new entrants and smaller WISPs, cost is often the major factor in infrastructure procurement. However, many WISPs who used to be in those categories are today enjoying significant growth, prompting them to rethink infrastructure investments as part of their overall business plan.
By Stephane Varin, Senior Product Manager
In an era of growing security threats from terrorism, border security and immigration, attacks on critical infrastructure and general public unrest, the issue of security in communication networks is more important than ever. The new generation of IP-based wireless technology is an enabler for applications such as mobile commerce, voice over IP (VoIP) and high-definition video delivery to smartphones, but it has also opened some sinkholes in the foundation that pre-LTE architectures and applications have established.
By Jim Hong, Director of Wireless Broadband Solutions
The new and exciting news in Government Funding – The latest round of CAF-II has been awarded and now WISPs and Rural Operators are expanding their coverage into rural areas that have little or no Internet access.
What comprises complex rural networks? A combination of microwave Point-to-Point and Point-to-Multipoint technologies are being used to reach remote WISP and Rural Operator customers and deliver high-speed internet: up to 20 Gbps on the backbone and hundreds of megabits per household.
By Randy Jenkins, Director, Business Development
Commercial mobile networks in the US are morphing into critical infrastructure as homeowners abandon their landline phones and rely instead on their mobile phones. Critical alerts, evacuation information, and family reconnections are relying on mobile networks in times of disasters. Unfortunately, those are exactly the times that the mobile network infrastructure is most severely tested and in recent past has shown it cannot stand up to the rigors of these disasters. The US Federal Government (FCC) and state/regional entities are looking at ways to limit the impacts of these disasters.
By Stuart Little, Director of International Product Line Marketing
Papua New Guinea, or PNG, is one half of the island of New Guinea, along with offshore islands, located in the South Pacific immediately to the north of the Australian continent. The country is rugged and heavily covered by dense rainforest, which presents enormous challenges when it comes to establishing a national communications infrastructure. In most cases, deploying fiber routes is simply not practical nor affordable. Wireless is the only answer in these cases.
When people think of mobile security, they usually think of encryption for their smartphones, tablet computers such as the BlackBerry PlayBook or other wireless devices. Or they think of a remote “wipe” capability that can render any lost device blank of any data if some unauthorized party did in fact try to enter the device illegally. These wireless solutions are all state-of-the-art thinking in the mobile security community. And many wireless equipment OEMs and third-party mobile security providers offer them.