The World of VoLTE

In 2012, VoLTE made it’s debut with the first VoLTE networks being launched in South Korea. Not long thereafter, an increasing number of MNOs followed South Korea’s example by introducing voice on their own 4G networks. Since then, from 2015 to 2018, the number of VoLTE networks around the world has nearly tripled!  Find out […]

Continue reading

Carriers World Panel Session

On Wednesday September 27th at 11:20 Kees Hol, iBasis Business Strategist, will be participating in a panel session discussion on Reality check: Why has the IPX interconnect market proved slow to pick up and what can be done to change this? Topics discussed will include: Delivering business models for IPX success How can carriers make it […]

Continue reading

Expanding the Horizon of VoLTE

National and International Trade Since the beginning of time people have been involved in trade, which involves the transfer of goods or services from one person to another. First locally, and later across borders. International trade of goods and services has taken place throughout history with classical examples such as the ‘Salt Road’, ‘Amber Road’, […]

Continue reading

VoLTE of People

The fifth generation (5G) Today, 5G is the new buzzword. This fifth generation of mobile networks will offer a wide array of considerable improvements compared to 4G. Think of the capacity it will be able to hold, such as streaming live television via 5G home internet or data to and from autonomous (“driverless”) cars. The […]

Continue reading

Addressing the Vulnerabilities of VoLTE

Mobile operators around the world are launching Voice service over their LTE infrastructure (VoLTE) as the primary voice solution for their LTE subscribers. Unlike traditional circuit-switched voice, VoLTE exclusively uses IP packets over the LTE core network. Regardless of whether the call is domestic, international or roaming, is free of charge to the end user. Such a collective operational decision among the GSMA community simplifies the process of billing and settlement among MNOs, however it introduces a vulnerability for exploitation from some adversaries.

Continue reading