Wireless

Improved Network Quality and User Experience to Be Showcased in CloudCO Demo

Broadband Forum
As the broadband industry migrates to software defined open networks, 14 vendors, service providers, and consultancy companies are coming together to demonstrate greater automation, reduced network congestion and greater interoperability.

Improved quality and user experience in case of Wi-Fi or network congestion, better utilization of network resources, and zero-touch service provisioning from multiple vendors will be delivered at this year’s CloudCO Demo from Broadband Forum at this year’s Network X (previously Broadband World Forum). This has been enabled by this year’s sponsors: Altice Labs, Deutsche Telekom, Hewlett Packard Enterprise, Juniper Networks, Nokia, Radisys, Reply and Zyxel.

“CloudCO provides a network operator with a 'step by step' approach to migrate from existing infrastructure while still amortizing their existing hardware investments. Our work is enabling operators to disaggregate their networks, virtualize functionality, and move to the SDN driven solutions of the future, The open standards work is available to any vendor so it can truly enable the flexibility and commercial ability for the operators to select any vendor who complies with the open interfaces and specifications inside their CloudCO enabled network.”

Broadband Forum Technical Chair Lincoln Lavoie

This multi-vendor environment is highlighted by so many participating companies at this year’s demo including Altice Labs, BISDN, Domos, DZS, Hewlett Packard Enterprise, University of New Hampshire InterOperability Laboratory (UNH-IOL), Juniper Networks, Nokia, Open Networking Foundation (ONF), Outsys, Radisys, Reply, Vodafone and Zyxel. Testing and integration of the demo was carried out by the UNH-IOL, an independent provider of broad-based testing and standards conformance solutions for the networking industry.

The CloudCO framework brings tangible benefits to the industry and helps operators migrate from legacy networks traditionally based on many individual network elements to a truly open software defined access network. This virtualization and disaggregation of the network can help operators build their network based on their specific requirements, and they can have confidence that these components can interoperate with each other.

The demo includes work from the Forum’s Quality Experience Delivered (QED) project that probes the network to recognize network performance (packet loss, latency) between the subscriber premises and any location in a provider’s network. Another focus of this year’s demo is zero-touch service assurance enabled by the Automated Intelligent Management (AIM) framework, along with QED to assure the best service path and user experience in case of Wi-Fi congestion or network congestion, handled through closed loop automation.

An example use case will be showcased of a home Wi-Fi network with a demanding application, and the quality of a 4K video being suboptimal when streamed. In the demo, network performance is measured by the probes embedded in the network and Residential Gateway and reported to the AIM controller, where the quality issue is diagnosed. The Wi-Fi application embedded in the CPE then takes action and performs traffic steering on the Wi-Fi layer, resulting in improved quality for the video stream.

“Over the last decade, network operators have recognized the need to take advantage of innovative technologies and solutions to minimize OPEX while continuing to scale their networks for growth,” said Ken Ko, Managing Director at Broadband Forum. “This is especially true in the home network to minimize customer complaints and on-site maintenance, as well as anticipate faults and degradation via analysis of the network and traffic conditions to help establish expected service levels before the user perceives a service issue. These network element components can be implemented as virtualized functions in a cloud-native environment, and developed and deployed seamlessly in a timely fashion.”

Zero-touch service provisioning and set-up with virtualized management and control functions in a multi-vendor environment will also be showcased during the demo. Zero-touch service provisioning was previously limited to one vendor, but this is no longer the case, and the multi-vendor capability is of great value to service providers with Optical Line Terminals (OLTs) based on different implementations from different vendors that can all be managed on a single access management platform. This approach can enable automation for network operations with minimal human intervention, networks can become more agile and reduced CAPEX and OPEX can be delivered.

The CloudCO demo also encompasses work on the disaggregated BNG based on Broadband Forum’s specification TR-459 that includes separation of Control and Data planes to enable the best utilization of network resources and efficient paths. The operator can then optimize access to the Internet using session steering, directing traffic through the best BNG user plane for each subscriber.

In addition, for the first time the demo will highlight the interworking between Broadband Forum and the ONF to align their architectures for access network virtualization and enable interoperability. The framework allows integrating OLTs with the established VOLTHA framework in a CloudCO environment via the Broadband Forum specified APIs. This extends the addressable market for suppliers supporting this solution, and operators looking to adopt standardized open-source solutions.

Interested in attending this year’s Network X? Reserve your seat now within the BASe Workshops here. Take a look at last year’s CloudCO Demo here.

About the Broadband Forum
Broadband Forum is the communications industry’s leading open standards development organization focused on accelerating broadband innovation, standards, and ecosystem development. Our members’ passion – delivering on the promise of broadband by enabling smarter and faster broadband networks and a thriving broadband ecosystem.

Broadband Forum is an open, non-profit industry organization composed of the industry’s leading broadband operators, vendors, thought leaders who are shaping the future of broadband, and observers who closely track our progress. Its work to date has been the foundation for broadband’s global proliferation and innovation. For example, the Forum’s flagship TR-069 CPE WAN Management Protocol has nearly 1 billion installations worldwide.

Broadband Forum’s projects span across 5G, Connected Home, Cloud, and Access. Its working groups collaborate to define best practices for global networks, enable new revenue-generating service and content delivery, establish technology migration strategies, and engineer critical device, service & development management tools in the home and business IP networking infrastructure. We develop multi-service broadband packet networking specifications addressing architecture, device and service management, software data models, interoperability and certification in the broadband market.

Spotlight

Other News
Network Security

Ampliphae, HPE Athonet and Arqit deliver Quantum-Safe Private 5G using Symmetric Key Agreement

PR Newswire | January 19, 2024

Arqit Quantum Inc, a leader in quantum-safe encryption, and Ampliphae Ltd (Ampliphae), a leader in network cyber security solutions, have today announced successful completion of a project that will deliver enhanced quantum-safe security for Private 5G networks. The Security Enhanced Virtualised Networking for 5G (SEViN-5G) project, funded by Innovate UK, the UK Government’s innovation agency, leveraged Ampliphae’s network security analytics technology and Arqit’s Symmetric Key Agreement Platform to deliver a quantum-secure Private 5G testbed that can protect against both current and future cyber threats. Athonet, a Hewlett Packard Enterprise acquisition, provided the Radio Access Network (RAN) equipment for the project with a cloud core hosted on AWS. Private enterprise networks based on 5G cellular technology are accelerating digital transformation across industries including manufacturing, healthcare, defence and smart cities. Private 5G gives enterprises access to high-speed, massively scalable, and ultra-reliable wireless connectivity, allowing them to implement innovative IoT and mobile solutions that enhance productivity, drive automation and improve customer engagement. The security of these networks will be paramount as they will support safety-critical infrastructure and carry highly sensitive data. But like any new technology, 5G comes with potential new threats and security risks including the threat from quantum computing. The project finished in December 2023 and customer engagement has already begun. David Williams, Arqit Founder, Chairman and CEO said: “Enterprises want to deploy Private 5G networks with complete confidence that they will be safe from both current and future cyber threats including from quantum computers. Working alongside Ampliphae, we have shown that a quantum-safe Private 5G network is deliverable using Arqit’s unique encryption technology.” Trevor Graham, Ampliphae CEO said: “Private 5G can be hosted partly or completely in the Cloud, giving enterprises the opportunity to rapidly set up their own cellular networks customised to support their operations. With Ampliphae and Arqit they can now be certain that those Private 5G networks are monitored and secure against eavesdropping and disruption.” Nanda Menon, Senior Advisor Hewlett Packard Enterprise said: “In an era where security is paramount, the completion of the SEViN-5G project is a significant milestone. The delivery of a quantum-secure Private 5G testbed, achieved where Athonet have combined the Athonet core with CableFree radios, underscores the commitment to innovation and reinforces the confidence enterprises can have in deploying networks that are both cutting-edge and secure from both present and future threats.” About Arqit Arqit Quantum Inc. (Nasdaq: ARQQ, ARQQW) (Arqit) supplies a unique encryption Platform as a Service which makes the communications links of any networked device, cloud machine or data at rest secure against both current and future forms of attack on encryption – even from a quantum computer. Compliant with NSA standards, Arqit’s Symmetric Key Agreement Platform delivers a lightweight software agent that allows devices to create encryption keys locally in partnership with any number of other devices. The keys are computationally secure and operate over zero trust networks. It can create limitless volumes of keys with any group size and refresh rate and can regulate the secure entrance and exit of a device in a group. The agent is lightweight and will thus run on the smallest of end point devices. The Product sits within a growing portfolio of granted patents. It also works in a standards compliant manner which does not oblige customers to make a disruptive rip and replace of their technology. Recognised for groundbreaking innovation at the Institution of Engineering and Technology awards in 2023, Arqit has also won the Innovation in Cyber Award at the National Cyber Awards and Cyber Security Software Company of the Year Award at the Cyber Security Awards. Arqit is ISO 27001 Standard certified. www.arqit.uk About Ampliphae Ampliphae’s distributed network analytics technology provides insight into how networks are used to support enterprise operations at every level. A graduate of the prestigious LORCA cyber accelerator in London, and the AWS European Defence Accelerator, Ampliphae’s technology is already used by enterprises across multiple verticals to discover, analyse and secure the network traffic that supports their key applications and business processes. Ampliphae’s Encryption Intelligence product operates at enterprise scale to discover devices and applications that use cryptography, analysing their encryption capabilities to detect risks, including assets that are vulnerable to future quantum computer attack. Using Encryption Intelligence, the organisation can gather effective operational intelligence about their encryption landscape, both within and outside the organisation, and build an effective mitigation program to address current and future vulnerabilities.

Read More

Network Security

Cato Networks Introduces World's First SASE-based XDR

PR Newswire | January 25, 2024

Cato Networks, the leader in SASE, announced the expansion of the Cato SASE Cloud platform into threat detection and incident response with Cato XDR, the world's first SASE-based, extended detection and response (XDR) solution. Available immediately, Cato XDR utilizes the functional and operational capabilities of the Cato SASE Cloud to overcome the protracted deployment times, limited data quality, and inadequate investigation and response experience too often associated with legacy XDR solutions. Cato also introduced Cato EPP, the first SASE-managed endpoint protection platform (EPP/EDR). Together, Cato XDR and Cato EPP mark the first expansion beyond the original SASE scope pioneered by Cato in 2016 and defined by industry analysts in 2019. SASE's security capabilities encompassed threat prevention and data protection in a common, easy-to-manage, and easy-to-adopt global platform. With today's announcement, Cato is expanding SASE into threat detection, incident response, and endpoint protection without compromising on the architectural elegance captured by the original SASE definition. "Cato SASE continues to be the antidote to security complexity," says Shlomo Kramer, CEO and co-founder of Cato Networks. "Today, we extend our one-of-a-kind SASE platform beyond threat prevention and into threat detection and response. Only Cato and our simple, automated, and elegant platform can streamline security this way." An early adopter of Cato XDR is Redner's Markets, an employee-owned supermarket chain headquartered in Reading, Pennsylvania, with 75 locations. Redner's Markets' vice president of IT and Infrastructure, Nick Hidalgo, said, "The Cato platform gave us better visibility, saved time on incident response, resolved application issues, and improved network performance ten-fold." (Read more about Redner's Markets and Cato in this blog. "The convergence of XDR and EPP into SASE is not just another product; it's a game-changer for the industry," said Art Nichols, CTO of Windstream Enterprise, a Cato partner. "The innovative integration of these capabilities brings together advanced threat detection, response capabilities, and endpoint security within a unified, cloud-native architecture—revolutionizing the way enterprises protect their networks and data against increasingly sophisticated cyber threats." (Read more about what Cato partners are saying about today's news in this blog.) Platform vs. Product: The Difference Matters Cato XDR takes full advantage of the enormous benefits of the Cato SASE Cloud platform, the first platform built from the ground up to enable enterprises to connect, secure, and manage sites, users, and cloud resources anywhere in the world. Unlike disjointed point solutions and security appliances, Cato capabilities are instantly on, always available at scale, and fully converged, giving IT teams a single, shared context worldwide to understand their networks, prevent threats, and resolve problems. As an autonomous platform, Cato SASE Cloud sustains its evolution, resiliency, optimal performance, and security posture, saving enterprises the operational overhead of maintaining enterprise infrastructure. Enterprises simply subscribe to Cato to meet their business needs. Cato's cloud-native model revolutionized security and networking operations when it was introduced in 2016, a fact validated three years later in 2019 when the Cato approach was formally recognized by the industry as SASE. Breach Times Still Too Long; Limitations of Legacy XDR Cato is again revolutionizing cybersecurity with the first SASE platform to expand into threat detection, empowering security teams to become smarter and remediate incidents faster. The flood of security alerts triggered by network sensors, such as firewalls and IPS, complicates threat identification. In 2023, enterprises required 204 days on average to identify breaches.1 XDR tools help security analysts close this gap by ingesting, correlating, and contextualizing threat intelligence information with the data from native and third-party sensors. However, legacy XDR tools suffer from numerous problems relating to data quality. Sensor deployment extends the time-to-value as IT must not only install the sensors but also develop a baseline of specific organizational activity for accurate assessments. Data quality is also compromised when importing and normalizing third-party sensor data, complicating threat identification and incident response. Security analysts waste time sorting through incident stories to identify the ones most critical for immediate remediation. Once determined, incident remediation is often hampered by missing information, requiring analysts to master and switch between disparate tools. No wonder in 2023, average breach containment required more than two months.1 Cato XDR and Cato EPP Expands the Meaning of SASE Cato XDR addresses legacy XDR's limitations. Instantly activated globally, Cato XDR provides enterprises with immediate insights into threats on their networks. Incident detection is accurate due to Cato's many native sensors – NGFW, advanced threat prevention (IPS, NGAM, and DNS Security), SWG, CASB, DLP, ZTNA, RBI, and now EPP/EDR. Powered by Bitdefender's world-leading malware prevention technology, Cato EPP protects endpoints from attack – in the Cato way. Endpoint threat and user data are stored in the same converged Cato data lake as the rest of the customer's network data, simplifying cross-domain event correlation. The result is incredibly high-quality data that improves the incident identification and remediation process. Cato AI uses the data to accurately identify and rank incidents, empowering analysts to focus critical resources on an organization's most important remediation cases. Cato AI is battle-tested and proven across years of threat hunting and remediation handling by Cato MDR service agents. Remediation times reduce as detected incident stories contain the relevant information for in-depth investigation. Cato's tools sit in the same console as the native engines, enabling security analysts to view everything in one place -- the current security policy and the reviewed story. Finally, incident reporting is simplified with generative AI. Purpose-built for investigations, this natural language engine provides human-readable explanations of incident stories. Analysts save time sharing incident information with other teams and reporting to their managers.

Read More

Spotlight

Resources