The obvious advantages of an NFV network architecture are reduced capital expenditure (CAPEX) and operating expenditure (OPEX). Whereas the old paradigm required bespoke hardware devices for each network function – hardware devices that quickly became obsolete as average hardware capabilities surpassed them – NFV allows network functions to be virtualised and run on commercial off the shelf (COTS) servers.
To reduce operating expenditure (OPEX) and minimise rack space usage hardware accelerator cards can be implemented into existing Commercial off the Shelf (COTS) servers or integrated into new systems. Offloading processing to a hardware accelerator card, such as the MPAC-IP 7000 Series from Telesoft, enables the host COTS server to maximise processing power for third party applications without the need for an expensive overhaul of existing infrastructure. Resources can then be freed up and re-purposed or used to extend processing capabilities, reducing capital expenditure (CAPEX).
Stringent standards for protocol adherence and stability meant development of these hardware devices was slow but despite the time spent developing them the continual acceleration of hardware capabilities, as described by Moore’s law, meant they soon became obsolete. This resulted in operators continually having to repeat the cycle of design, integrate and deploy just to keep up with competitors. Not only is this expensive, it does little if anything to bring in additional revenue as customers come to expect the services offered by the new hardware platforms as standard.
Sophisticated cyber-attacks, orchestrated by well organised and financially motivated criminal groups, look to take advantage of holes in network security that become vulnerable as networks increase in complexity. The goal of such attacks is to steal valuable data, money or to cause general network disruption but the effects extend beyond the immediate damage caused by the attack. The potential ramifications such as loss of credibility, reputation, customer trust and legal breaches could have a significant lasting negative impact for businesses and organisations.
A recent whitepaper from Telesoft looked at the enormous increase in high bandwidth services, in particular video, and the difficulties this creates for monitoring and analysis systems. Many providers are finding that it’s not commercially sustainable to keep purchasing more hardware and software in response to demand for high bandwidth services which are projected to keep increasing.
Steve is an experienced technical B2B cyber security specialist and Director. Steve is a frequent speaker on topics including security breaches, big data analytics, audit and compliance, and IT forensics.
We recently completed a large migration project for one of our market leading legacy products the OKEFORD 2450 IVR, working with a Tier 1 Service Provider and one of the biggest System Integrators to migrate all of the revenue generating services provided by the OKEFORD 2450 IVR, to our latest iteration, the OKEFORD 5500 Media Platform.
For more than 20 years we have supported operators and governments across every network generation including wireless, cable, LTE, 2G, 3G and 4G. We have worked with over 250 operators in 100 countries. During this time, we have established an impressive UK base of operations, with offices in both the US and India. This has allowed us to build an international team of professional, knowledgeable and experienced employees. Giving Telesoft a unique view of the global Telecommunications market, how it works and more importantly what our customers need to stay one step ahead of their competitors.
We are using cookies to provide statistics that help us give you the best experience of our site.
Cookies are short reports that are sent and stored on the hard drive of the user's computer through your browser when it connects to a web. Cookies can be used to collect and store user data while connected to provide you the requested services and sometimes tend not to keep. Cookies can be themselves or others.
There are several types of cookies:
Technical cookies that facilitate user navigation and use of the various options or services offered by the web as identify the session, allow access to certain areas, facilitate orders, purchases, filling out forms, registration, security, facilitating functionalities (videos, social networks, etc..).
Customization cookies that allow users to access services according to their preferences (language, browser, configuration, etc..).
Analytical cookies which allow anonymous analysis of the behavior of web users and allow to measure user activity and develop navigation profiles in order to improve the websites.
So when you access our website, in compliance with Article 22 of Law 34/2002 of the Information Society Services, in the analytical cookies treatment, we have requested your consent to their use. All of this is to improve our services. We use Google Analytics to collect anonymous statistical information such as the number of visitors to our site. Cookies added by Google Analytics are governed by the privacy policies of Google Analytics. If you want you can disable cookies from Google Analytics.
However, please note that you can enable or disable cookies by following the instructions of your browser.