5G
Article | May 18, 2023
There is a fundamental shift in demand for core network services from enterprise customers, away from MPLS and private leased circuits to fixed broadband, Ethernet VPN, and DIA. Omdia forecasts that through 2026, the increase in revenue from fixed broadband, Ethernet VPN and DIA will be insufficient to make up for the decline in revenue from MPLS and private leased circuits.
Read More
5G
Article | September 28, 2023
Emerging virtual and hybrid private 5G solutions are enabling communication service providers (CSPs) to address a large number of new consumer and enterprise edge use cases. Each of these edge use cases will require a specific network deployment model and edge user plane connectivity. That’s why we’ve designed our 5G edge user plane to tackle five distinct key capabilities: support of flexible network deployments, 3GPP dual-mode support, integrated Gi LAN services, integrated probing with edge analytics and edge exposure enablement. Let’s dive into this blog post to learn how the powerful 5G edge user plane is unlocking new 5G edge use cases.
How technological innovation creates value and benefits society has always interested me, influencing my work as a mobile network technologist and sales professional. Since mobile data was introduced in late 90s, both mobile network technology and mobile consumer use cases have evolved enormously. Indeed, a rapid increase in connectivity speed and the introduction of smartphones have pushed the market to adopt mobile web and video and create thousands of new applications. However, sometimes ‘killer use cases’ require both business case and application ecosystem maturity. One example is video conferencing, one of the key services 3G was designed for but was only introduced when the over-the-top (OTT) vendors disrupted the content provider market and popularized social media. Creation of mobile technology has indeed its own innovation cycles and research feeds and therefore can't depend on market pull, but you can draw the conclusion that the time to value greatly benefits when the broad business and technology ecosystem in the value chain collaborate and co-create solutions.
Precisely, what’s really exciting about 5G is that it coincides with the maturity of other two disruptive technology enablers for end applications: artificial intelligence (AI) and cloud edge computing. It also comes at a moment when there’s both an urgent need and huge financial support to digitalize society and industry. In fact, more than ever, we are witnessing a close collaboration between technology and business ecosystems. Over the past few years, there have been a large number of public-private consortiums to feed service requirements into 5G standards, explore and validate the value of 5G technology. For example, just to name few, the 5G alliance for connected Industries and automation (5G-ACIA) or European 5G infrastructure Public Private Partnership (PPP) projects. For years, 3GPP standards have been preparing to define advanced 5G connectivity solutions for edge computing and vertical digitalization use cases. In addition, all sorts of consumer and enterprise edge applications are being developed at the same pace in many areas such advanced video processing, AI analytics, immersive gaming, smart grid applications, automated guided vehicles (AGVs) controls or industry automation.
The edge ecosystem is particularly complex and involves different players. One key pillar is the wireless connectivity service CSPs offer. 5G-ACIA introduced the concept of virtual private and hybrid private 5G solutions, two emerging solutions that CSPs are exploring to complement their private 5G network offerings. Such solutions allow CSPs to leverage their existing public networks and offer new services in an agile and cost-effective manner using new 5G capabilities such as network slicing. In order to address edge use cases, virtual and hybrid private 5G solutions need to bring the user plane connectivity to the edge by deploying 5G edge user plane functions.
The 5G edge user plane supports flexible network deployments
One key learning from industry experimentation with 5G is that each use case brings a unique combination of connectivity requirements, in terms of end-to-end performance (uplink and downlink latency, jitter, packet loss and throughput), data privacy and security, robustness, wide vs local area coverage and mobility.
Latency and security requirements drive the selection of the edge location, which can be the enterprise premise, CSP access or regional data center or even the extended public edge such as content delivery networks (CDN) content provider or a hyper cloud provider’s (HCP) edge data center. For example, a mobile gaming application can be located in the CSP regional data center or HCP edge, whereas video processing and AI for a factory automation application is located on the factory premise. Also edge distribution can be accounted by CSP for those use cases which produce significant amount of data such as fixed wireless access (FWA) to optimize backhaul costs.
Ericsson has a vast experience supporting and driving the ecosystem to realize time critical communication use cases at scale and has conducted detailed latency analysis for different type of deployments. The RAN deployment needs to be carefully planned according to the specific use case performance characteristics. Some use cases can be achieved with existing macro RAN environment -4G or non-standalone 5G-, with macro RAN standalone 5G with or without dedicated quality of service (QoS) profiles or even may require network slicing to partition macro RAN. In contrast, some other use cases will need dedicated RAN deployments. In addition, most use cases will benefit from a dedicated edge user plane function, as it provides a higher level of performance and robustness.
In summary, the concrete edge use cases to be offered and CSP’s own solution preferences drive the type of network solution and deployment, which can be a private 5G network, a virtual or a hybrid 5G private network using existing macro or dedicated RAN, with or without network slicing.
The edge 5G user plane function should allow for such deployment flexibility and enable the different edge use cases characteristics. Ericsson Local Packet Gateway (LPG) addresses this by:
Supporting any access technology, radio deployment model and RAN vendor
Seamlessly integrating with Ericsson’s existing dual-mode 5G Core. which is prepared for slicing, efficient routing to edge (also called edge breakout) and advanced QOS and many other 5G edge features described in more detail in next section.
Supporting a fast time to service, deployment simplicity and a very low footprint enabling deployment at scale in any type of edge location, up to on enterprise premises. See our previous LPG 5G edge user plane: key requirements for success for details.
Providing a high level of robustness and failure resilience by means of a cloud native user plane application designed for high availability and fault resilience, support of geo-redundancy and support of 3GPP control plane and user plane split (CUPS) interface which can be deployed in full mesh with multiple control planes. User plane can also be deployed as a dedicated function within a slice to secure further characteristics and isolation or as a shared function for various slices.
5G edge user plane should enable transition from 4G to more sophisticated 5G connectivity
Most of CSPs are embracing edge opportunities. They are viewing the opportunities as an evolution of their existing offerings rather than a revolution, meaning existing 4G enterprise use cases will still need to be supported for some time as the ecosystem matures to support time-critical communications type of use cases. This means 5G edge user plane should be dual-mode and support such a wide breadth of technology.
5G edge user plane should support both 3GPP compliant serving/packet gateway user function (S/PGW-U) and user plane function (UPF) and evolve with advanced UPF features for time-critical communications, such as more stringent end to end QoS and transmission robustness for ultra-reliable low latency communications (URLLC) or Ethernet connectivity for advanced edge industrial use cases. It should also support 5G peak rates and do not degrade use cases performance characteristics. It should also support dynamic edge routing solutions which are efficient, deployable by multipurpose terminals and mobility proof such as dynamic network slice selection which is preferrable to UPF as uplink classifier as starting solution until standardization evolves.
5G edge user plane should work in conjunction with the CSP’s dual-mode core system, which supports dynamic slicing orchestration, dynamic slice selection, ultra-reliable low latency communications and advanced 5G edge connectivity features such as different service continuity and user plane re-anchoring modes depending on mobility and application resilience needs. Ericsson’s dual-mode 5G Core with Local Packet Gateway provides such advanced 5G connectivity in a pre-verified manner. In fact, the Ericsson Local Packet Gateway Cloud Native Function (CNF) is based on the same software as the Ericsson Packet Core Gateway (PCG), the market leading cloud-native user plane, which is deployed in 5G live networks today.
Such deployment flexibility in edge user plane allows CSP to offer distinct use cases. For example, CSPs can offer mobile gaming service by deploying a cloud virtual reality (VR) gaming center application in their regional data centers. Connectivity with guaranteed low latency QoS can be provided by a dedicated 5G network slice with the dedicated Ericsson Local Packet Gateway, deployed close to the gaming application and connected to the CSP’s existing central core network. The mobile gaming application can use a portable device such as VR glasses or use a multi-purpose smartphone or tablet that supports dynamic slice selection. CSP can reuse their existing public network and macro 5G RAN. As another example, CSP can offer 5G edge connectivity to factories or logistic centers for augmented reality (AR) quality inspection. The AR application is deployed on the factory premise and needs an ultra-reliable and low-latency QoS connection to process in real time all the factory images. This is provided by a dedicated Ericsson Local Packet Gateway with ultra-reliable low latency QoS and redundant configuration being deployed on premises.
Edge use cases will require user plane services beyond 3GPP
There is a set of non-standardized user plane functions deployed in today’s networks (also called GI/N6 LAN functions) for mobile broadband service that would be also relevant for edge use cases. These functions can be categorized as:
Traffic acceleration and optimization of access resources e.g., transport layer optimizers or advanced video traffic shapers
Network services e.g., carrier grade NAT devices or external load balancers
Service aware traffic monitoring and enforcements needed to realize customized CSP charging data plans or comply with some country regulatory such as content filters
Network security functions protecting CSP infrastructure and UEs of security attacks such as subscriber firewalls or distributed denial (DDoS) mitigation systems, and
Service chain policers and forwarders to chain and offload these GI/N6 LAN functions. Those can be integrated with operator policy framework to compose and program a unique data pipeline which addresses the specific connectivity needs of a given subscriber and application in the context of a certain use case
The current GI/N6 LAN market is very fragmented and addressed by many different vendor specific user plane functions. These functions are deployed as separate appliances or virtualized functions, each with their management system, policy integration and cloud orchestration system which significantly increases CSP’s total cost of ownership (TCO) when deploying and managing them. As CSPs start their edge journey they will need to bring some of these GI/N6 functions to the edge. A very simple and cost-efficient strategy to consolidate these functions in one single edge user plane function. This approach is being adopted by Ericsson Local Packet Gateway: it integrates these functions, including advanced integrated Packet Core Firewall, together with the UPF/S/PGW-U functions. This dramatically reduces the TCO and provides a single hop to the end application, which reduces further the latency. Ericsson Local Packet Gateway also allows to compose and tune the set user plane functions applied to a given traffic in one configuration click, which allows to customize the connectivity for each edge use case.
Another consideration is that these GI/N6 functions were designed for legacy mobile broadband. This means they will need to evolve to support 5G peak user throughput rates and new 5G segment requirements, e.g., traffic optimizations should focus on optimizing the throughput of uplink transmissions and reducing the overall jitter and latency. Service aware charging models will evolve as 5G gets monetized, security for edge enterprise connectivity will keep evolving as well. Technological innovation in this space is a must for any edge user plane vendor and should be holistic considering the entire ecosystem and end-to-end solution behavior. As one example, edge user plane can leverage 3GPP exposure interfaces for application detection, use collaborative solutions with content providers or RAN to optimize traffic delivery or even adapt traffic optimizations to new end to end rate adaptation mechanisms such as low latency low loss scalable throughput (L4S). Ericsson, as an end-to-end network provider and key contributor to 5G standardization, is working actively in this space.
Edge connectivity needs to be monitored and assured
CSPs need to monitor, troubleshoot, and assure the edge user plane connectivity. In many cases the CSP organizations dealing with enterprises services have their own analytic and management systems. Those systems need to evolve to provide visibility of the 5G encrypted communication, up to on enterprise premise and without compromising 5G security and provide advanced insights to meet the stringent service level agreements of edge use cases. Example of user plane data feeds are traffic packet and patterns statistics, key performance indicators at transport level or service quality of experience estimates per application, area of interest, slice and subscriber type. CSP analytic use cases will also evolve, meaning network assurance and service experience management use cases will increasingly adopt AI/ML models with distinct and very demanding UP data sets running in parallel.
External probing solutions were not designed for these requirements. The cost of evolving and deploying such solutions to thousands of edges is unaffordable. Ericsson Local Packet Gateway addresses this challenge by supporting integrated dual-mode probing capabilities which includes rich, granular data with pre-processed data and advanced data collection profiles avoiding the need of deploying external taps, packet broker and probes at edge. Software probes are a unique Ericsson dual mode 5G Core feature – a feature that’s very popular with our customers for public network and enterprise solutions.
CSP will also introduce network data analytics function (NWDAF) function to enable 5G analytics for further 5G automation, new exposure APIs for verticals and data efficiency. An NWDAF can collect edge user plane and public network data to provide real time analytics which can be consumed by the network functions or by the end edge application to improve further the edge connectivity. Example of those analytics are user mobility, network congestion, quality of service, service experience or abnormal user behavior. Ideally, the NWDAF should be distributed at the edge and deployed co-located to the edge user plane for data efficiency, security and lower actuation latency.
Ericsson NWDAF supports such distributed and co-located deployment and analytics and can collect pre-standard data from the Local Packet Gateway data until 3GPP rel-18 specifies UPF event exposure.
Edge exposure for advanced edge connectivity
Exposure through APIs on the edge is becoming increasingly important for CSPs to enable new services, increase their relevance in the 5G ecosystem and become more attractive partners for hyperscale cloud providers, application ecosystems and other players.
Edge applications will be able to consume network capabilities and data to provide advanced services and innovate. Data extracted from edge user plane function will be of high value. For example, to determine the exact UE sessions being anchored by a given edge user plane, the actual monitored QoS, etc. Such exposure capabilities in edge user plane allows application to adapt the content delivery or reconfigure dynamically the connectivity, e.g., change dynamically the negotiated QoS or influence edge routing. As mentioned previously, NWDAF user plane analytics can be also exposed for advanced edge use cases.
Ericsson is already working with our customers to create new edge use cases using Ericsson Local Packet Gateway and Edge Exposure Server. Stay tuned!
Summary:
In this blog post we’ve explained the different considerations that need to be taken into account when selecting the 5G edge user plane, and how it enables flexible virtual private and hybrid 4G private solution deployments and address the user experience idiosyncrasy of myriads of edge use cases. The 5G edge user plane has to be small, cost efficient, easy to deploy but still extremely powerful and advanced in terms of dual connectivity and added value features.
Ericsson Local Packet Gateway is designed with all these capabilities in mind and integrates seamlessly with existing CSP dual-mode 5G Core, delivering edge use cases was never that easy.
Read More
Enterprise Mobility, Mobile Infrastructure
Article | June 16, 2023
Telecommunications conglomerate Verizon has partnered with 3D development platform Unity to create entertainment applications and enterprise toolkits that can render 3D environments almost instantaneously, without the need for expensive hardware.
In a press release, Verizon said products from this collaboration will address the demand for instantaneous content in industries such as gaming, retail, and sports, where emphasis is placed on real-time digital immersion.
“We are entering an era of technology-led disruption where 5G and MEC will not only transform the full enterprise lifecycle, it will change the way consumers experience gaming and entertainment,” said Verizon Chief Executive Officer Tami Erwin.
These products will utilise 5G and Mobile Edge Computing (MEC) technology, taking the best of both worlds to enhance the digital experience for consumers.
The concept of edge computing has actually been around for roughly three decades, but it wasn't until recently that we've been able to apply it to Internet of Things (IoT) devices. Edge architecture reduces latency by moving computer services closer to the source — the "edges" — of the data. This not only decongests the centralised cloud of information, but also decreases the distance the data needs to cover to reach user terminals.
Meanwhile, 5G is the highly anticipated next generation broadband network that promises to deliver high speeds with just millisecond latencies. Despite the pandemic, its rollout hasn’t slowed down at all, with countries like China, South Korea, and the US getting a first taste of the technology.
The promise of lightning-fast connections, however, comes at a steep cost: 5G stations consume plenty of energy to work.
Though much of 5G's advantages come from its streamlined digital routing capabilities, it's also underpinned by a powerful network of hardware components — more precisely, printed circuit boards (PCBs). To answer the demand for more energy, engineers use ties to meet PCB requirements for solving the challenges that come with powering a standard board. These include considerations like signal paths and planar delays, among others. Placing the net ties at the right junctions distributes energy more evenly, thus providing efficient power delivery to 5G networks.
Despite all the touted capabilities of 5G, experts have flagged cybersecurity as one major concern. As a new innovation, 5G is still fairly unregulated, leaving loopholes and security gaps that cyber criminals can exploit. For instance, the expansion of bandwidth coverage actually opens up vulnerabilities and additional avenues for cyber attacks. Furthermore, the hyper connected nature of IoT devices makes it easier for hackers to gain access to different networks, both private and public; and unwitting users can potentially expose their contacts to virtual attackers.
Because of these threats, experts urge telecom companies to lay down a solid bedrock for 5G security before finalising the pivot towards it. For now, it remains to be seen how legislators and regulators will implement standards to guide the public in its use of 5G.
Amid this concern, Verizon and Unity are hopeful that their collaboration — and the marriage of 5G and MEC technology — will be a game changer in the gaming, retail, and entertainment industries.
“We know the world is demanding high-speed, AAA content, whether it’s an educational augmented reality application or a robot running a simulation of a digital twin,” Unity Vice President for Solutions Ryan Peterson said.
“5G is the key piece for us to facilitate these real-time 3D experiences broadly and to better meet the demands of the real-time economy.”
Read More
Network Security
Article | October 26, 2021
Cybercrimes have increasingly become a matter of concern for companies worldwide. Over the past few years, the rise of big-ticket ransomware attacks and exposure of perilous software supply chain infections has awakened organizations to various digital dangers.
So, the big question is, how to combat the security threats that are on meteoric growth?
The best solution is to adopt a security vulnerability assessment.
What is Security Vulnerability Assessment?
A vulnerability assessment involves a systematic review of security hazards, which helps identify IT infrastructure’s weaknesses, risks, and vulnerabilities.
When it comes to mitigating vulnerabilities and resolving issues, the collective imperative is to analyze the problem areas before getting them fixed.
A security assessment is critically important to combat the complexities and with an effective vulnerability assessment program, organizations use the tools required to comprehend the probable security weaknesses and enable the protection of systems and data from intruders and unauthorized breaches.
For most organizations, ensuring the safety of devices, networks, applications, and digital assets are part of a broader vulnerability management strategy. It includes an extensive assessment, in-depth processes, and mitigation methods to explore the entire threat spectrum.
Typically, it is conducted regularly. Vulnerability assessment offers a firm assurance in the security of data, especially when some alterations have been implemented or a new service has been added, or, for that matter, and installation of new equipment has taken place.
Each assessment provides a perspective about the risk in its periphery and suggests solutions to control the risk factors and the evolving threats.
Why Security Vulnerability Assessment Is Necessary?
The perpetual threat of cybercrime has necessitated the demand for vulnerability assessments significantly. They make organizations realize their security defects and contribute towards mitigating them.
Hackers are forever ready to make phishing attacks. As per reports, hackers are at work every 39 seconds. Thus, it is extremely important to be vigilant or complacent to activate hackers’ and cybercriminals’ machinations. Over the period, cybercrimes are fluctuating and thus need ongoing attention.
The ideal solution is to undertake consistent vulnerability assessments to safeguard confidential data, systems, and networks. Furthermore, it helps organizations understand the risk and enables smart decision-making.
To ensure security, companies ought to conduct both external and internal scans of their networks.
According to Gartner (paywall), “Large organizations with thousands of employees, tens of thousands of servers and many operating systems receive hundreds of requests per year to patch thousands of vulnerabilities that cannot be remediated in less than 15 days.”
One of the best reasons security vulnerability assessments are important is because it confirms an enterprise’s management processes and whether it has covered every critical patch through outlined existing remediation.
Why Do Companies Need Vulnerability Assessment?
A vulnerability assessment provides companies insightful details on all types of security discrepancies in their environment.
It paves ways to evaluate the risks associated with the flaws.
This helps organizations have a better knowledge of their security scare, overall weaknesses, and assets.
Moreover, the first thing that strikes us on hearing about a cyber-attack is the security of data. With the right and adequate implementation of security assessments, the safety and security of important data could be easily protected. A security assessment would be helpful to reduce irrelevant expenses and make space and increase the IT budget to invest in other key aspects.
Undoubtedly, data breach causes substantial loss to an organization, which leads to legal hassles and financial hazards. In fact, most of the time companies fail to recover the loss.
Thus, it doesn’t harm to place solid policies and methods to strengthen the entire security position of the organization and this can only be possible with a strategic security vulnerability assessment.
In a nutshell, this would keep the companies aware and, in all likelihood, keep the cyber-criminals at bay.
A CASE STUDY ANALYSIS
To cite an example, let’s take how Zensar conducted a three-pronged vulnerability assessment with port scan and penetration scanning. It determined the security of its offerings to meet customer requests for Brainshark, a leading provider of on-demand presentation solutions, helping customers deliver business interaction across 600+ ranking companies in the market.
While Brainshark knew their systems were secure and could also establish it through their documentation, they still undertook a third-party security vulnerability assessment.
Zensar’s vulnerability assessment procedures were based on the industry’s best practices that included tests for SQL injection, cookie manipulation, access control weakness, session state, and cross-site scripting.
The focus of the test was to identify the host and application security concerns. Upon completing the tests and assessments, Brainshark expressed satisfaction and was confident enough in their ability and solution. They knew their security posture was highly protected and secure.
Types of Vulnerability Assessments:
Vulnerability assessments unearth a variety of system and network vulnerabilities. This indicates the reliability of the assessment process, which is implemented with different tools, scanners, and methods that helps discover the vulnerabilities, risks, and threats.
Network-based assessment scanning: It is used to determine the presumptive network security attacks. This kind of scanning can also detect the vulnerable systems on wired as well as wireless networks.
Host-based scans: It is easy to locate the vulnerabilities in servers or other network hosts with host-based scanning. This type of scanning provides visibility into the configuration settings and legacy systems.
Database scans: Database scans ascertain the weak points in a database to preclude malefic attacks.
Application Scans: It examines websites to identify and recognize software vulnerabilities and inaccurate configurations in network or web applications.
Summing Up
Organizations need to be watchful every minute and ensure the security posture is rigorous, which is only possible with security vulnerability assessments. Based on this criterion, understanding company risks gets simplified in turn preventing intrusions and threats.
FREQUENTLY ASKED QUESTIONS
What Are the Advantages of Security Vulnerability Assessment?
There are several advantages attached to security vulnerability assessments. To put it precisely, it can help identify the vulnerabilities before cybercriminals do and determine the level of risk.
Undoubtedly, opting for vulnerability assessment would save a lot of time and money and mitigate the risk and prevent the irrelevant expenditure that follows after the cyber-attacks.
What Are the Disadvantages of Security Vulnerability Assessment?
While vulnerability assessments are highly advisable, it has its share of drawbacks which cannot be ignored. One of the primary limitations of vulnerability assessment is that it does not hint at every vulnerability that exists. Moreover, it sometimes signals false positives too.
{
"@context": "https://schema.org",
"@type": "FAQPage",
"mainEntity": [{
"@type": "Question",
"name": "What Are the Advantages of Security Vulnerability Assessment?",
"acceptedAnswer": {
"@type": "Answer",
"text": "There are several advantages attached to security vulnerability assessments. To put it precisely, it can help identify the vulnerabilities before cybercriminals do and determine the level of risk.
Undoubtedly, opting for vulnerability assessment would save a lot of time and money and mitigate the risk and prevent the irrelevant expenditure that follows after the cyber-attacks."
}
},{
"@type": "Question",
"name": "What Are the Disadvantages of Security Vulnerability Assessment?",
"acceptedAnswer": {
"@type": "Answer",
"text": "While vulnerability assessments are highly advisable, it has its share of drawbacks which cannot be ignored. One of the primary limitations of vulnerability assessment is that it does not hint at every vulnerability that exists. Moreover, it sometimes signals false positives too."
}
}]
}
Read More