March 31, 2021 By Jeffrey Palmer < 1 min read

What if you could quickly maneuver mobile radio access network (RAN) assets remotely in such a way that they work when and where you need them, all within an open architecture?

This is the idea behind a virtual radio access network (vRAN) and the opposite approach of a traditional RAN platform, which is based on proprietary hardware and relies on long lifecycles in operation, development and deployment.

In the following video, we’ll explain and contrast RAN and vRAN and show practical examples of application today. You’ll find out why Communications Service Providers (CSPs) see vRAN as a game-changer in relation to their business and service models:

Explore key vRAN features

  • Proprietary and expensive hardware is replaced: You disaggregate the RAN architecture, now providing open interfaces and an ecosystem in which many vendors and solution providers can innovate. 
  • vRAN applies the principles of network function virtualization (NFV): RAN network functions are virtualized and deployed on cloud platforms. vRAN brings the benefits of cloud and the ability to take a platform-centric approach by deploying RAN network functions on an agile, scalable and hybrid platform on common-off-the-shelf (COTS) hardware. This breaks down silos and minimizes CAPEX and OPEX.
  • Network functions can be flexibly deployed: In the context of 5G, this is very important to support higher cell and device density and a wide variety of use cases not limited to physical network functions.
  • vRAN enables cloud automation: Automation software can monitor key performance metrics, rebalance the workload and simplify maintenance. This helps CTOs make time for brilliance (i.e., spend more time on innovation).

Ready to learn more?

Was this article helpful?
YesNo

More from Cloud

Enhance your data security posture with a no-code approach to application-level encryption

4 min read - Data is the lifeblood of every organization. As your organization’s data footprint expands across the clouds and between your own business lines to drive value, it is essential to secure data at all stages of the cloud adoption and throughout the data lifecycle. While there are different mechanisms available to encrypt data throughout its lifecycle (in transit, at rest and in use), application-level encryption (ALE) provides an additional layer of protection by encrypting data at its source. ALE can enhance…

Attention new clients: exciting financial incentives for VMware Cloud Foundation on IBM Cloud

4 min read - New client specials: Get up to 50% off when you commit to a 1- or 3-year term contract on new VCF-as-a-Service offerings, plus an additional value of up to USD 200K in credits through 30 June 2025 when you migrate your VMware workloads to IBM Cloud®.1 Low starting prices: On-demand VCF-as-a-Service deployments begin under USD 200 per month.2 The IBM Cloud benefit: See the potential for a 201%3 return on investment (ROI) over 3 years with reduced downtime, cost and…

The history of the central processing unit (CPU)

10 min read - The central processing unit (CPU) is the computer’s brain. It handles the assignment and processing of tasks, in addition to functions that make a computer run. There’s no way to overstate the importance of the CPU to computing. Virtually all computer systems contain, at the least, some type of basic CPU. Regardless of whether they’re used in personal computers (PCs), laptops, tablets, smartphones or even in supercomputers whose output is so strong it must be measured in floating-point operations per…

IBM Newsletters

Get our newsletters and topic updates that deliver the latest thought leadership and insights on emerging trends.
Subscribe now More newsletters