Incognito Blog

Your source for opinion and insight on network management trends and subscriber experience optimization.

A Technical Guide to DOCSIS 3.1 and Beyond – Part. 3: The Future of DOCSIS

In my last two posts of the Technical Guide to DOCSIS 3.1, we explored both the bandwidth capacity increases, and the technical advantages enabled by DOCSIS 3.1. Over the next few years, we will start to see wide-scale commercial adoption of DOCSIS 3.1. But what happens next? DOCSIS 3.1 still has some faults that will need to be explored to further advance the communications industry. Continue Reading

Continue Reading
  • Share:

A Technical Guide to DOCSIS 3.1 and Beyond – Part. 2: Technical Advantages

In my last post, we found that DOCSIS 3.1 has the potential to enable a 10x capacity increase over DOCSIS 3.0. Let’s look at the technical details how that is achieved, the challenges in upgrading and some of the solutions for supporting a heterogeneous deployment. If that in itself isn’t reason enough for your business to consider an upgrade, here’s a list of the technical advantages enabled by DOCSIS 3.1: Continue Reading

Continue Reading
  • Share:

5 reasons why you should adopt NFV for your CPEs

Communication service providers around the world are about to embark on an epic journey. A journey which has the potential to be a major game changer for hardware and software vendors alike. The simple concept of decoupling software from hardware, referred to as network functions virtualization (NFV), promises to improve an operator’s ability to differentiate themselves from the competition by moving network functions from dedicated appliances to generic commercial off-the-shelf (COTS) servers. This ability provides a wealth of benefits including service agility, cost reduction, and improved subscriber insight, all with vendor freedom on a future-proofed platform. Continue Reading

Continue Reading
  • Share:

IoT Has a New Friend — 802.11ah

Throughout the last year, enabling the Internet of Things (IoT) is a topic that has risen to the forefront for many communication service providers. Even people outside of the broadband industry understand the importance of connected devices, because the reliance on IoT is growing every day. We now have Internet-enabled light bulbs, dead bolts, smoke detectors, refrigerators, mirrors, and yes, even toothbrushes. Continue Reading

Continue Reading
  • Share:

Join the Conversation: Take the IPv6 Survey

It’s finally happened — the American Registry of Internet Numbers (ARIN) is the latest regional Internet registry to announce exhaustion of IPv4 addresses. At an industry conference last week, ARIN announced that all IPv4 addresses will be gone by the middle of August. Supply has dropped to the point that now, like service providers in Europe and Asia-Pacific, North American operators will need to be IPv6-ready in order to expand in the future.

With public IPv4 resources fast depleting, we want to know — how are you coping? Continue Reading

Continue Reading
  • Share:

vCPE: The Turbo Button for Your Legacy Gateways

In my last blog, we explored the advantages of virtualizing network and gateway functions to reduce CAPEX and OPEX using virtual customer premises equipment (vCPE). But this raised a new question: Should service providers virtualize the entire network and gateway, or is it better to adopt a hybrid approach? Additionally, how long should you wait to transition to a virtual approach? Continue Reading

Continue Reading
  • Share:

Fraud Prevention or: How I Learned to Stop Worrying and Love the Cable Modem

In an age where providers are trying to increase their average revenue per user (ARPU), they must arm themselves to fight service theft. There is no ARPU to increase when there is no revenue collected from a subscriber. Furthermore, service theft can affect quality of experience (QoE) on a network and require further investment to ensure QoE remains high for paying customers. Although service theft has become harder to perform, it is still a major problem. Operators must avoid taking a reactive approach to revenue assurance by finding a solution that can identify and protect their networks from service theft. Continue Reading

Continue Reading
  • Share: