Thursday, August 11, 2022
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Internet Of Things

Cisco Industrial Routers and 2G & 3G sunset

Researcher by Researcher
April 5, 2022
in Internet Of Things
0
Cisco Industrial Routers and 2G & 3G sunset
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


Cellular technology, evolving from 2G, 3G, 4G/LTE and now 5G, is one of the main pillars of industrial IoT networks. It enables connectivity with thousands of remote devices deployed in the field, across industries and use cases.

Like any technology, cellular technology evolves over time as new releases of 3GPP specifications are developed, implemented by vendors, and adopted by services providers or private networks operators. Today, the main market trend is 4G/LTE services, while new 5G services are now appearing around the world.

Related articles

Makulu Linux Shift makes shifting between desktop layouts easy

Makulu Linux Shift makes shifting between desktop layouts easy

August 10, 2022
Quantum networking: Defining the next wave of networking and communications

Quantum networking: Defining the next wave of networking and communications

August 9, 2022

What about legacy 2G and 3G services still in use on many industrial deployments around the world?

The number of cellular devices reached 8.6 billion in 2021 and associated applications are growing exponentially.  Repurposing spectrum previously utilized on 2G and 3G networks for use with faster and more efficient 4G/LTE and 5G services is part of all mobile network operators planning. The dates for the sunset of 2G and 3G technologies vary by world region and mobile operator. End users must be aware of these sunset dates and migrate to 4G/LTE connectivity prior to these dates to prevent loss of connectivity.

2G and 3G sunset overview

While the below list of sunset schedules for worldwide 2G and 3G mobile operators is not exhaustive, it supports you to start planning for the impact on your industrial IoT network.

Industrial IoT routers – modularity a KEY requirement

Industrial IoT networks leveraging cellular technologies are generally deployed for 5-10 years. The mobile phones industry, with its nearly 15 billion devices [Statista], has a shorter life span of 18-30 months [Statista U.S.]. This represents a challenge for modem vendors. They must renew their chipset to align with new 3GPP releases, while maintaining older generations of modem chipsets and firmware. That is why the deployment of industrial IoT routers such as the latest Cisco IR series with modular cellular interface enables future proofing and smooth evolution of cellular technology without replacing all equipment.

Cisco industrial IoT routers – preparing for 3G sunset

All Cisco industrial IoT routers support 4G/LTE, even those purchased in the last 10 years. It means your industrial IoT network is mostly ready for the 3G sunset. The following best practices will ensure a smooth transition from 3G to 4G.

  • Run one of the most recent Cisco IOS or Cisco IOS-XE releases
  • Upgrade your modem firmware to the most recent release available on Cisco.com for your modem type. Be aware that Cisco IOS upgrades don’t update your modem’s firmware.
  • Validate that your SIM subscription is 4G/LTE enabled and review your data plan as appropriate.
  • Lock your cellular interface configuration to “all-LTE-only” to avoid any 3G fallback that may disrupt the communications.
  • Monitor the 4G/LTE signal quality in case radio coverage is different between 3G and 4G/LTE services.
  • Review Cisco’s router antennas guide in case you would like to plan for new 4G/LTE (e.g. CBRS B48) or 5G (e.g. n77, n78) frequency bands. If required, plan to upgrade the antennas accordingly.
  • Automation and network management tools and security best practices don’t require changes.

Share:



Source link

Tags: CiscoIndustrialrouterssunset
Share76Tweet47

Related Posts

Makulu Linux Shift makes shifting between desktop layouts easy

Makulu Linux Shift makes shifting between desktop layouts easy

August 10, 2022
0

Image: valiantsin/Adobe Stock I’ve been using Linux since 1997, which (for me) is a badge of honor. Then, using Linux...

Quantum networking: Defining the next wave of networking and communications

Quantum networking: Defining the next wave of networking and communications

August 9, 2022
0

Ed Fox, CTO of MetTel, explains quantum networking and how it will transform communications. Image: DP/Adobe Stock For many, quantum...

Gartner identifies 25 emerging technologies in its 2022 hype cycle

Gartner identifies 25 emerging technologies in its 2022 hype cycle

August 9, 2022
0

The technologies could enable immersive experiences, accelerated AI automation and optimized technologist delivery in the next two to 10 years,...

Will smart glasses replace smartphones?

Will smart glasses replace smartphones?

July 29, 2022
0

Image: Google Glass On July 19, 2022, Google announced testing for new smart glasses with augmented reality technology. Inevitably, the...

The metaverse is making significant strides in the business world

The metaverse is making significant strides in the business world

July 27, 2022
0

Two thirds of organizations are using technologies such as augmented and virtual reality, blockchain, cryptocurrencies and NFTs, according to a...

Load More
  • Trending
  • Comments
  • Latest
Brave browser’s Tor mode exposed users’ dark web activity

Brave browser’s Tor mode exposed users’ dark web activity

February 18, 2022
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
A first look at threat intelligence and threat hunting tools

A first look at threat intelligence and threat hunting tools

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
U.S. Gov Offers $5M Reward For North Korean Cybercrime Intel

How Three Ransomware Groups Targeted One Vulnerable Network

August 11, 2022
High-Severity Flaw in Argo CD is Information Leak Risk

Organizations Warned of Critical Vulnerabilities in NetModule Routers

August 11, 2022
Join the SD-WAN webinar: How to Extend Network Visibility and Optimize the SaaS Experience

Join the SD-WAN webinar: How to Extend Network Visibility and Optimize the SaaS Experience

August 11, 2022
Makulu Linux Shift makes shifting between desktop layouts easy

Makulu Linux Shift makes shifting between desktop layouts easy

August 10, 2022

Recent Posts

U.S. Gov Offers $5M Reward For North Korean Cybercrime Intel

How Three Ransomware Groups Targeted One Vulnerable Network

August 11, 2022
High-Severity Flaw in Argo CD is Information Leak Risk

Organizations Warned of Critical Vulnerabilities in NetModule Routers

August 11, 2022
Join the SD-WAN webinar: How to Extend Network Visibility and Optimize the SaaS Experience

Join the SD-WAN webinar: How to Extend Network Visibility and Optimize the SaaS Experience

August 11, 2022

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • Malware
  • Networking
  • Protection

Tags

Access Android attack Attacks banking BiWeekly bug Cisco critical Cyber Cybersecurity Data devices Digital exploited financial Finds Fintech Flaw flaws Google Group Hackers Krebs Latest malware Microsoft million Network News open Payments phishing Ransomware RoundUp security Software TFT Threat Top vulnerability warns Week Windows zeroday

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved