Latest from Wray Castle RSS

5G, Telecoms Business -

If you’re following 5G developments you’ll be interested in this overview of how 5G helps to effectively deliver ever-increasing amounts of capacity in support of current and evolving telco business models. Telcos face significant financial challenges in delivering huge amounts of additional capacity across their networks. This is however a fundamental and ongoing requirement that enables their primary business models. The way in which capacity can be increased is effectively limited to four options: Increase the number of base stations Increase the spectrum deployed on those base stations Use the spectrum / radio resources more efficiently / effectively Offload onto...

Read more

eSIM -

The traditional SIM card has been a central part of digital mobile communications for 30 years. This unassuming piece of plastic has been responsible for controlling access to GSM mobile networks worldwide, helping to protect assets worth over a trillion dollars per year. However, SIM technology is currently undergoing a major evolution, called Embedded SIM or ‘eSIM’ cards. Instead of receiving then inserting a physical SIM card into your mobile phone to get it connected, consumers will download a ‘SIM’ directly into their device, anytime, anywhere. WHAT ARE THE BENEFITS OF ESIM TECHNOLOGY? There are many advantages of using eSIM...

Read more

LTE -

Voice over LTE VoLTE stands for Voice over LTE and it is the umbrella term covering all methods of transporting voice and other Circuit Switched (CS) services over an LTE / 4G network. It is also the specific term applied to the provision of those services via an IP Multimedia Subsystem (IMS) rather than a legacy CS core network. The supporters of VoLTE claim, with some justification, that it’s the voice solution LTE was designed to support. Other methods of providing voice and CS services, such as CS Fallback, are simply transitional steps that operators can take on the way...

Read more

5G security is built firmly on the foundations supplied by 4G security, albeit with significant enhancements. Here we’ll look at what’s stayed the same and where the differences are in how security is implemented in 4G and 5G. A deeper dive into this topic is available in our 5G Security course. 5G - an evolution not a complete change 5G can be viewed as an evolution of 4G rather than as completely new technology with many 5G features being enhancements, improvements or extensions of the equivalent 4G features. This principle can be seen quite clearly in the area of 5G network security...

Read more

Wray Castle Group, a new holding company, dedicated to serving the global Telecommunications and Cybersecurity industries, is pleased to announce it has acquired Wray Castle Training, effective immediately. Group announces plans to expand within the MENA region. Established in 1958, Wray Castle Training is the leading telecommunications training provider. Delivering effective learning pathways, from entry-level graduate through to experienced professionals, using a broad spectrum of teaching methods including online, distance learning and classroom. Having delivered training courses in over 55 countries, Wray Castle’s customers include: Vodafone, BT, Orange, T-Mobile, BAE Systems, government agencies, energy and transportation utilities (Network Rail, E.on),...

Read more