Qualcomm Snapdragon 855 features the Snapdraong X50 5G modem, but the Snapdragon 865 with integrated 5G will use the latest Snapdragon X55 5G modem in specific countries. Checkout @rquandt’s Tweet: https://twitter.com/rquandt/status/1124395309386301440?s=09
Monday, 6 May 2019
Saturday, 4 May 2019
The Chairman Statement on cyber security of communication networks in a globally digitalized world.
PREAMBLE: COMMUNICATION NETWORKS IN GLOBALLY DIGITALIZED WORLD
Communication is the cornerstone of our societies. It defines almost every aspect of our lives. Yet the rapid development and scale on which we use communication technologies increases our dependency and vulnerabilities. 5G networks and future communication technologies will transform the way we communicate and the way we live substantially. Transportation, energy, agriculture, manufacturing, health, defense and other sectors will be significantly enhanced and altered through these next generation networks. High-speed low-latency technology is expected to allow for a true digital evolution, stimulating growth, innovation and well-being. Automatization of everyday activities and the use of the internet of things in its full potential will be made possible. These developments, however, invoke major risks to important public interests and have national security implications. Today, malicious actors operate in cyber space, with the intention to undermine cohesion of our societies and paralyze the proper functioning of states or businesses. This includes attempts to control or disrupt our communication channels and the information transmitted. In digitalized societies, this can have serious consequences. Security of communication channels has therefore become vital. Disruption of the integrity, confidentiality or availability of transmitted information or even the disruption of the service itself can seriously hamper everyday life, societal functions, economy and national security. Communication infrastructures are the cornerstone of our societies, with 5G networks to become the building blocks of a new digital environment.
ON THE IMPORTANCE OF SECURITY OF 5G NETWORKS
Considering that security of 5G networks is crucial for national security, economic security and other national interests and global stability, the chair believes that the architecture and functions of 5G networks must be underpinned by an appropriate level of security. EU Member States underline their own ongoing process aimed at defining a common EU approach on the issue of cybersecurity of 5G networks as initiated by the European Commission with the publication of its Recommendation published on 26 March 2019. With the intention to support ongoing discussions how to decrease the security risks associated with developing, deploying, operating, and maintaining complex communication infrastructures such as 5G networks, the chair recognizes existence of the following perspectives: Cyber security not only a technical issue Cyber security cannot be regarded as a purely technical issue. A safe, secure and resilient infrastructure requires adequate national strategies, sound policies, a comprehensive legal framework and dedicated personnel, who is trained and educated appropriately. Strong cyber security supports the protection of civil liberties and privacy. Both technical and non-technical nature of cyber threats When dealing with cyber security threats, not only their technical nature, but also specific political, economic or other behaviour of malicious actors which seek to exploit our dependency on communication technologies should be taken into account. Possible serious effects of 5G networks disruption Due to the wide application of 5G based networks, unauthorized access to communications systems could expose unprecedented amounts of information or even disrupt entire societal processes. Nation-wide approach Policies and actions taken to ensure a high level of cyber security should not be aimed and carried out only by primary stakeholders (i.e. operators and technology suppliers), but should also be reflected by all relevant stakeholders in other areas and sectors which significantly influence the general level of security, e.g. education, diplomacy, research and development, etc. Safeguarding cyber security of communication infrastructure is not solely an economic or commercial issue. Proper risk assessment essential Systematic and diligent risk assessment, covering both technical and non-technical aspects of cyber security, is essential to create and maintain a truly resilient infrastructure. A risk based security frameworks should be developed and deployed, taking into account state of art policies and means to mitigate the security risks. Broad nature of security measures Cyber security measures need to be sufficiently broad to include whole range of security risk, i.e. people, processes, physical infrastructure, and tools both on the operational and strategic level. No universal solutions The decision on the most optimal path forward when setting the proper measures to increase security should reflect unique social and legal frameworks, economy, privacy, technological self-sufficiency and other relevant factors important for each nation. Ensuring security while supporting innovation Innovation is the main driver of development and economic growth in modern societies. It also fosters new security solutions. Policies, laws, and norms, should allow security measures to be flexible to manage the interface between security and specific national conditions. Through this flexibility, creativity and innovation should be encouraged. Security costs money Achieving a proper level of security sometimes does require higher costs. Increased costs should be tolerated if security necessitates it. At the same time, security does not necessarily imply higher costs. Supply chain security Shared responsibility of all stakeholders should drive supply chain security. Operators of communication infrastructure often depend on technology from other suppliers. Major security risks emanate from the cross-border complexities of an increasingly global supply chain which provides ICT equipment. These risks should be considered as part of the risk assessment based on relevant information and should seek to prevent proliferation of compromised devices and the use of malicious code and functions. Bearing in mind these perspectives, the chair calls upon a responsible development, deployment, and maintenance of 5G networks and future communication technologies, considering the following proposals and best practices.
The Chairman suggests following proposals in four distinct categories in preparation for the roll out of 5G and future networks. Policy Communication networks and services should be designed with resilience and security in mind. They should be built and maintained using international, open, consensus-based standards and risk-informed cybersecurity best practices. Clear globally interoperable cyber security guidance that would support cyber security products and services in increasing resilience of all stakeholders should be promoted. Every country is free, in accordance with international law, to set its own national security and law enforcement requirements, which should respect privacy and adhere to laws protecting information from improper collection and misuse. Laws and policies governing networks and connectivity services should be guided by the principles of transparency and equitability, taking into account the global economy and interoperable rules, with sufficient oversight and respect for the rule of law. The overall risk of influence on a supplier by a third country should be taken into account, notably in relation to its model of governance, the absence of cooperation agreements on security, or similar arrangements, such as adequacy decisions, as regards data protection, or whether this country is a party to multilateral, international or bilateral agreements on cybersecurity, the fight against cybercrime, or data protection. Technology Stakeholders should regularly conduct vulnerability assessments and risk mitigation within all components and network systems, prior to product release and during system operation, and promote a culture of find/fix/patch to mitigate identified vulnerabilities and rapidly deploy fixes or patches. Risk assessments of supplier’s products should take into account all relevant factors, including applicable legal environment and other aspects of supplier’s ecosystem, as these factors may be relevant to stakeholders’ efforts to maintain the highest possible level of cyber security. When building up resilience and security, it should be taken into consideration that malicious cyber activities do not always require the exploitation of a technical vulnerability, e.g. in the event of insider attack. In order to increase the benefits of global communication, States should adopt policies to enable efficient and secure network data flows. Stakeholders should take into consideration technological changes accompanying 5G networks roll out, e.g. use of edge computing andsoftware-definedd network/network function virtualization, and its impact on overall security of communication channels. Customer – whether the government, operator, or manufacturer -- must be able to be informed about the origin and pedigree of components and software that affect the security level of the product or service, according to state of art and relevant commercial and technical practices, including transparency of maintenance, updates, and remediation of the products and services. Economy A diverse and vibrant communications equipment market and supply chain are essential for security and economic resilience. Robust investment in research and development benefits the global economy and technological advancement and is a way to potentially increase diversity of technological solutions with positive effects on security of communication networks Communication networks and network services should be financed openly and transparently using standard best practices in procurement, investment, and contracting. State-sponsored incentives, subsidies, or financing of 5G communication networks and service providers should respect principles of fairness, be commercially reasonable, conducted openly and transparently, based on open market competitive principles, while taking into account trade obligations. Effective oversight on key financial and investment instruments influencing telecommunication network development is critical. Communication networks and network service providers should have transparent ownership, partnerships, and corporate governance structures. Security, Privacy, and Resilience All stakeholders including industry should work together to promote security and resilience of national critical infrastructure networks, systems, and connected devices. Sharing experience and best practices, including assistance, as appropriate, with mitigation, investigation, response, and recovery from network attacks, compromises, or disruptions should be promoted. Security and risk assessments of vendors and network technologies should take into account rule of law, security environment, vendor malfeasance, and compliance with open, interoperable, secure standards, and industry best practices to promote a vibrant and robust cyber security supply of products and services to deal with the rising challenges. Risk management framework in a manner that respects data protection principles to ensure privacy of citizens using network equipment and services should be implemented.
Wednesday, 13 March 2019
NASA's OPALS announced a breakthrough in space-to-ground communication December 9, 2014, uploading 175 megabytes in 3.5 seconds. Their system is also able to re-acquire tracking after the signal was lost due to cloud cover.
Sunday, 17 February 2019
A Quiet Controversy
Possible Health Risks of 5GIf dozens of studies have already demonstrated that there is a link between EMF exposure (at the levels emitted by 4G networks) and negative health outcomes, what sort of effects will we see once we are immersed in much higher frequencies, coming from countless, nearby sources at all hours of the day?
These are five of the many other issues:
★ The 6 GHz road ahead is being mapped out
★ The impact of 6 GHz on home & enterprise Wi-Fi
★ New use cases & business opportunities
★ Global perspectives on affordable connectivity
★ New spectrum rules & their impact
Wednesday, 13 February 2019
A much-hyped network upgrade is ready for use is called "5G". To industry proponents, it's the next huge innovation in wireless internet. To the U.S. government, it's the backbone technology of a future that America will wrestle with China to control. To many average people, it's simply a mystery. The technology is one of the issues expected to take center stage at the MWC mobile conference in Barcelona, Spain, this month. The interest goes well beyond engineers: In Washington, there are fears that China could take the lead in developing the technology and sell equipment that could be used to spy on Americans. What, exactly, is 5G wireless — and will you even notice when it comes online?
WHAT IS 5G?
5G is a new technical standard for wireless networks — the fifth, naturally — that promises faster speeds; less lag, or "latency," when connecting to the network; and the ability to connect many devices to the internet without bogging it down. 5G networks will ideally be better able to handle more users, lots of sensors and heavy traffic. Before we can all use it, wireless companies and phone makers have to upgrade. Phones need new chips and radio antennas. The phone you have today won't work with a 5G network. Wireless companies have been getting ready. They've been revamping their network equipment, buying up chunks of radio spectrum for carrying 5G signals, and installing new 5G antennas on cellphone towers, utility poles and streetlights. Wireless providers will invest $275 billion in 5G-related networks in the U.S., according to CTIA, an industry trade group.
WHEN WILL IT BE AVAILABLE?
A true U.S. mobile rollout will start in 2019. It will take a few years to go national, and even then more rural areas of the country will not be covered in the "millimeter wave" frequencies that promise the highest data speeds and capacities, said Michael Thelander, CEO of wireless consultancy Signals Research Group. Thelander predicts that China may lag the U.S. by a year in its initial rollout, but will ultimately have the biggest deployment, while European countries will build out more slowly.
Beware of confusion, though. Wireless carriers have a history of rushing to slap the latest-and-greatest label on their networks, and this time is no different. AT&T has already applied the name 5G on a service that's not really 5G. (Sprint, upset, then sued its larger rival.) Once the network is ready, you'll need a 5G-enabled phone to connect to it. The first ones should be available in the first half of 2019, but a 5G iPhone isn't expected until 2020. 5G phones will most likely be more expensive than current 4G phones. Don't worry, even when 5G turns on, you can keep using 4G phones, just not at 5G speeds.
WHAT CAN 5G DO?
There's a considerable amount of hype over the promise of 5G. Industry groups say it will promote smart cities by connecting sensor networks that could manage traffic and quickly identify streetlight outages. 5G could connect self-driving cars and fuel new applications in virtual and augmented reality. Its high-speed connections could enable better remote surgery and other telemedicine, help companies automate their factories and offer businesses dedicated high-speed internet lanes. "5G speeds, and ever-faster home broadband, will mean that existing applications will get richer, and also that new applications will emerge — new Flickrs, YouTubes or Snapchats. We don't know what yet," Benedict Evans, a partner at Silicon Valley venture capital firm Andreessen Horowitz, wrote in a January blog post . The most immediate impact on consumers will be faster download speeds for movies and other video. Thelander says your phone's internet will work better in crowded locations such as stadiums.
WHAT ARE THE SECURITY CONCERNS?
The 5G network is one front in rising tensions between the U.S. and China. The U.S. government has warned U.S. companies not to use Chinese telecom technology in communications networks due to security concerns, and is pressing other countries to ban Huawei, a Chinese telecom company, from 5G network buildouts. U.S. officials have suspected for years that the Chinese government could use Huawei network equipment to help it spy. Huawei has rejected such accusations.
Tuesday, 12 February 2019
AT&T’s current 5G network uses 39 GHz while T-Mobile is leaning on having greater range with low-band 600 MHz spectrum.
Friday, 8 February 2019
Tuesday, 5 February 2019
Monday, 28 January 2019
Saturday, 26 January 2019
The British government has been asked to confirm that national telecommunications infrastructure is secure amid growing concerns about Chinese supplier Huawei. In letters to the secretaries of state for defence, foreign affairs and digital, Norman Lamb, chairman of the Commons Science and Technology Committee, said it was crucial the UK is confident in the security of its telecommunications infrastructure.
Lamb posed a series of questions, including how the government can assure the security of critical infrastructure when it is owned and run by private companies, and how it assesses and manages potential national security risks related to foreign suppliers.
The letters were prompted by nations in the Five Eyes alliance and the European Union appearing increasingly nervous about the possibility that Huawei kit is being co-opted by the Chinese government to pinch national secrets.
Bans have been enacted in the US, Australia and New Zealand, and France is rumoured to be considering one. Meanwhile, Canada arrested Huawei's CFO Meng Wangzhou, who is now facing extradition to the US, and the UK's Oxford university has reportedly scrapped all research grants from Huawei.
Those suspicious of Huawei and its links to the Chinese regime argue that these governments rarely enforce direct bans – but others question the lack of evidence, or even reports of evidence, for the allegations of spying. For its part, Huawei has repeatedly and strenuously denied all such allegations.
One example of such caution came from the president of Germany's cyber-risk assessment agency, who told Der Spiegel in December that there was "currently no reliable evidence" of a risk from Huawei.
However, a group set up in the UK to test the Chinese firm's kit, the Huawei Cyber Security Evaluation Centre, said in July last year that they had identified "shortcomings" in engineering processes that "exposed new risks in the UK telecommunication networks and long-term challenges in mitigation and management".
In December, there were reports that Huawei had agreed to spend $2bn on a security overhaul to address the issue – an investment that more sceptical readers might link to the fact the UK hasn't yet slapped a ban on the company's tech.
Chairman Lamb's questions to the officials – foreign secretary Jeremy Hunt, digital secretary Jeremy Wright and defence secretary Gavin Williamson (all PDFs) – sought to establish the accuracy of the claims around the Chinese firm, and why the UK hasn't followed suit.
"What assessment has the government made of the UK allies' actions regarding foreign involvement in their communications networks, and why has the government not pursued similar actions in the UK?" he asked.
A further question asked what assessment the government has made about whether Chinese legislation could compel Chinese companies in the UK to assist with Chinese national intelligence work. Lamb also asked about the government's response to the HCSEC's report, and whether it would expand this model to other foreign communications product or service suppliers.
A similar letter was sent to the executive director of Huawei in the UK, asking how the firm responds to the bans taken by the Five Eyes nations and whether it could be compelled to assist Chinese authorities.
T-Mobile has hired former Ericsson executive Ulf Ewaldsson to head up its 5G evolution strategy as the operator’s new SVP of Technology Transformation.
He will report to T-Mobile CTO and EVP Neville Ray. Ulf Ewaldsson T-Mobile's new SVP of Technology Transformation Ewaldsson spent nearly three decades at the Swedish telecom equipment giant, most recently as a senior advisor to Ericsson CEO Börje Ekholm.
Ewaldsson previously held leadership roles including SVP and Head of Business Area Digital Services, Chief Strategy & Technology Officer, Head of Group Function Strategy & Technology, and Head of Product Area Radio.
"We are thrilled to share the great news that Ulf is joining our team of amazing leaders at T-Mobile who continue to show the other guys what it takes to win in wireless. Just look at what we’ve done with 4G wireless! We’ve been the fastest for 19 straight quarters – nearly 5 straight years… and we’re just getting started.
Adding Ulf’s passion and track record for driving innovation to the Un-carrier mix is going to take us to the next level,” said Ray in statement. “Ulf has achieved so many firsts and truly supported the evolution of technology for telecommunications across the globe.
Bringing him on board is a total win for T-Mobile and we couldn’t wait to share it! He is going to be the perfect addition to our consumer-first Un-carrier team to drive our 5G evolution strategy!” Ewaldsson also currently serves as member and chairman of several boards, including the Swedish Royal Institute of Technology, ASSA-ABLOY AB, and Telecom Management Forum.
Ewaldsson and his family will relocate to the U.S. from Sweden, joining T-Mobile the last week in January, the company said.
Universities in Oxford and elsewhere in Europe are Suspending Research Funding from China's Huawei
Oxford University says it is suspending research grants and funding donations from Huawei amid growing security concerns about the Chinese telecom giant.
It's another setback for Huawei's image in Europe, an important market for the company, which has been effectively blocked in the U.S. over concerns its technology poses a cybersecurity risk.
It's now facing increasing scrutiny in Europe, where it is expected it to play a major role in building new fifth-generation mobile networks. The university decided on Jan. 8th 2019 that "it will not pursue new funding opportunities" with Huawei or related companies, it said in a statement Thursday.
The decision, which applies to both funding of research contracts and philanthropic donations, was made "in the light of growing public concerns raised in recent months" surrounding the company's U.K. partnerships.
Two existing research projects worth a combined £692,000 ($895,000) will continue, it said. "We hope these matters can be resolved shortly and note Huawei's own willingness to reassure governments about its role and activities," the university said.
Huawei said it was "not informed of this decision" and awaits the university's full explanation. Britain's defense secretary and its intelligence chief both voiced concerns last month about Huawei's involvement in the country's rollout of 5G networks. Huawei's troubles are expanding elsewhere in Europe.
The company fired its sales director in Poland last week after authorities there arrested him on charges of spying for China. The Czech Republic has warned against using Huawei equipment because of security fears and Norway is rethinking the company's role in its telecom networks.
Huawei founder, Ren Zhengfei said in a rare interview this week that his company would never share secrets about its customers and their communications networks. Ren's daughter, who is also the company's chief financial officer, is currently fighting a U.S. request that she be extradited from Canada on charges related to Iran sanctions violations
Wednesday, 16 January 2019
Meet the 5G Samsung Galaxy S10 X and its monstrous specs!
Samsung is pulling out all the stops for its all-new 5G colossus Samsung will unveil its all-new Galaxy S10 range on February 20, 2019 at simultaneous Galaxy Unpacked events in San Francisco and London.
Thanks to the prominent "10" emblazoned on the invitation, it seems pretty clear we'll see the Samsung Galaxy S10 , Galaxy S10 Plus, and new affordable Galaxy S10 Lite revealed during the keynote presentation next month.
However, the latest whispers suggest we could also see the foldable Galaxy X, a pair of sensor-packed Smart Shoes, as well as a 5G-enabled Galaxy S10 announced, too. The latter has been subject to a new leak which gives us a boatload of new details on the aforementioned 5G-compatible Galaxy S10 handset.
According to sources speaking to the publication, the so-called ultra-flagship model will be branded Galaxy S10 X. Galaxy S10 release date, price, features, 5G, leaks Samsung Galaxy X finally has a release date, and it's sooner than expected The addition of the "X" to the Galaxy S10 name is not only to signal the fact that the Galaxy S10 represents the tenth anniversary of the best-selling Galaxy S smartphone series, but also purportedly feeds into the marketing planned for the handset, which will centre around the buzzwords "eXperience" and "eXpansion".
Those of us who have been closely following the whispers from the supply chain in the run-up to the Galaxy S10 launch event will know that this name seems somewhat problematic. After all, Galaxy X has been heavily rumoured to be the name of the long-awaited foldable flagship phone due to be unveiled during the same keynote as the Galaxy S10 series.
Samsung briefly unveiled the pliable phone during its annual developer conference in San Francisco in November 2018, but neglected to confirm the name of the handset. They have not only revealed the branding of the upcoming Galaxy S10 X, but it has some new details around the specs squeezed inside the ultra-flagship. And it sounds like a beast of a smartphone. The 5G-enabled Galaxy S10 will include the same in-screen ultrasonic fingerprint scanner scheduled for the regular 4G-touting Galaxy S10 and Galaxy S10 Plus, as well as a whopping 1TB of built-in storage, an enormous 5,000mAh battery, and 10GB of RAM or more.
Wow. In addition to serious overkill specs inside the handset, there are claims that the flagship will boast six cameras (a dual-selfie camera on the front, and a quadruple set-up like the Galaxy A9 on the back), 3D depth-sensing for improved images, and a humongous 6.7-inch Super AMOLED Infinity-O style display.
Finally, the 5G-charged Galaxy S10 X will also include exclusive new software capabilities. The next-generation handset will purportedly use AI to attempt to automate some of its users most common software features. This sounds similar to what Google has introduced in its Android 9.0 Pie. However, Samsung is tipped to be pushing the features further using its Bixby talkative assistant.
So, what will the 5G Samsung Galaxy S10 X cost? Prices for the entry-level (non 5G) Galaxy S10 Lite will sit somewhere between £555, or $712 and £625, $801. Meanwhile, sources claim the maxed-out Galaxy S10 could reach as high as £1,250 or $1,603.
However, it's unclear whether this is a reference to the Galaxy S10 Plus, or the 5G-enabled Galaxy S10 X. According to an earlier Samsung Galaxy S10 UK price leak, the top-end smartphone model will reach an eye-watering £1,399 or $1,791. Given that the Galaxy Note 9 currently costs £1,099 or $1,149.99 for the maxed-out model with 512GB of built-in storage, these leaked high prices really don't seem that unrealistic.
5G device to device communication is such a product of progressive thinking, a network that uses both LTE communication scenario in conjugation with Wi-Fi low band communication.
The main idea for conjunction of two different types of network is based on the fact that base stations suffer large amount of traffic and tend to drop data and information in such cases. Apart from these facts another main stream goal is to provide security for such a communication technology.
The future 5G network is based on the transitioning nodes, a set of cluster head communicates with another cluster head using base stations and nodes in between transfer from one cluster head to another.
A Gray hole attack is a situation in which the attacker inserts a malicious node into cluster head and steals information. This paper is based on the performance of 5G networks and the likely effects of gray hole attacks on 5G networks.
Tuesday, 15 January 2019
Earliest tests of Loon started back 8 years ago in 2011, using a weather balloon and basic, off-the-shelf radio parts – the first prototype. The next years were a process of rapid iteration to prove beyond any doubt that the balloon-powered internet just works very well indeed in rural and metro areas around the globe.
Hands down the most fabulous 4K high-end Razer Blade 15 Advanced laptop launched in 2019, featuring the new RTX 2060, 2070 MAXQ and 2080 AXQ GPUs, making it an ideal gamer device.
I find any 4K OLED Panel and a 240Hz display is an extraordinarily powerful solution for Livestreaming.
Attend our secure audio/video conference call where we review our design of Hybrid5G infrastructure and discuss all the Smart Cities development issues. Join our secure free Livestream daily at the link below as we support up to 12 attendees for training at:
We are online every day of the week for an hour or two beginning 10 AM EST in January and February. If you have any questions about Hybrid5G Infrastructure or Smart Cities and IoT feel free to hit us up and drop in the above site at your earliest convenience.