1.6Tb class modules are now being developed to meet the raw bandwidth and bandwidth density demands of applications including ‘factory scale’ AI and hyperscale computing. Based on emerging standards from IEEE and OIF, they build upon a solid 800Gb ecosystem and include several new features – both evolutionary and revolutionary. 224G Signaling and FECi The […]

We now know that observability goes well beyond traditional network monitoring practices to take real-time visibility to the next level. It is worth taking a closer look at the ingredients needed to convert disparate data sources into actionable insights. With the quest for observability sometimes curtailed by network complexity, a holistic approach is essential. ho·lis·tic: […]

Engineer monitoring wind farm using fiber sensing

Bridges, tunnels, pipelines, telecom networks, electrical power transmission lines and other civil structures form the backbone of modern societies, facilitating essential services and connectivity. Ensuring the safety and integrity of these structures is of paramount importance. Thankfully, advancements in technology have led to innovative solutions for infrastructure monitoring, with fiber sensing technology emerging as a […]

Participating in its eighth consecutive O-RAN Alliance Global PlugFest, VIAVI once again contributed its comprehensive Open RAN testing suite and expertise to validate new products, specifications and use cases at nine labs across six countries. These PlugFests represent important, practical steps in developing the building blocks that will transform the network’s future. Radio testing is […]

This is the third article in our three-part series on 5G synchronization. The first article focused on the transport layer’s crucial role in 5G synchronization, highlighting the importance of technologies such as GNSS, PTP and SyncE in ensuring precise timing and reducing latency across sprawling networks. It also discussed the implementation challenges and the need […]

In cybersecurity, quantum computing presents both exciting new possibilities and threats to data confidentiality, integrity and security. While it promises unparalleled computational power, it also poses a significant risk to current encryption methods, which rely on mathematical problems that could be solved on a quantum computer running Shor’s algorithm.  As quantum computing advances, the urgency […]

As we continue our exploration of 5G synchronization in this second installment of our series, we shift our attention to the importance of synchronization in the radio access. The global rollout of 5G NR, predominantly employing TDD technology, underscores the necessity for all radios within a network to transmit in sync. This synchronization is crucial […]

Close