WELCOME TO The networking REPORT
What is Distributed NFV
| July 6, 2017
Headquartered in Poway, California, Apricorn provides secure storage innovations worldwide to companies and organizations seeking the ultimate protection for their data at rest.
Article | May 19, 2021
In today’s shop-from-anywhere world, the model for success continues to change. Tried and true techniques are becoming obsolete as consumer expectations evolve, demand volatility rises, and supply chain disruptions become more frequent. Retailers are also dealing with online shopping surges that add new complexities to existing data strategies due to an influx of raw, unprepped, and largely underutilized data.
CIOs know that ubiquitous connectivity across domains—campus, branch, cloud, and edge, wired or wireless—is a baseline requirement for building a digital enterprise. But, as CISOs know, as the network fabric spreads to encompass devices and location-agnostic data and compute resources, the need for end-to-end integrated security is equally paramount. Add in the necessity to continuously monitor and maintain application performance throughout campus and branch and edge locations and you create an enormous workload for NetOps and SecOps teams that are simultaneously dealing with static CapEx and OpEx budgets. Often the result is a tug-of-war between the teams: one striving to keep the network optimized for performance and availability, the other striving to keeping data, applications, and devices secure.
Enhanced security and privacy are cornerstones of 5G Core, but service providers still need to be able to capture quality, actionable data to secure the end-customer experience. Specifically, I’m referring to the data needed to perform troubleshooting, monitoring, customer care and analytics for marketing campaigns. But can this be done in 5G Core using traditional probing methods, without breaching security? The 3GPP standardization for 5G considers enhanced security to be an essential network component. Imagine, for a moment, that we live in a world where it’s common for open heart surgery to be conducted remotely, and I’m sure you’ll agree. The need for a secure, reliable network has resulted in the introduction of a new Service Based Architecture (SBA) that utilizes encrypted interfaces between network functions (NFs). Traffic between network functions is deployed in a cloud native 5G Core Kubernetes node and will not be visible outside the cluster, meaning traditional probing solutions are unsustainable.
The RAN (Radio Access Network) architecture for mobile networks includes a remote radio unit (RRU) located at the top of a cell tower, which communicates with a baseband unit (BBU) at the base of the tower. The hardware and communication interfaces are owned by a specific vendor, and its software-driven functionality is tightly coupled within the hardware.
Traditionally, this has worked well for mobile network operators (MNOs). However, there are several drawbacks to consider – for instance, upgrading or changing the wireless network demands physical hardware replacements throughout the network, which is cost-inefficient, labor-intensive, and time-consuming. Furthermore, the equipment and interfaces that connect the hardware are owned by the vendors that originally supplied them, which locks MNOs into existing relationships with them.
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up to contribute and publish your news, events, brand, and content with the community for FREE