The document discusses various industry organization initiatives related to 5G network convergence and orchestration, including:
- The Broadband Forum's work on 5G Fixed Mobile Convergence, including study documents and specifications.
- The Open Networking Foundation's Converged Multi-Access and Core project, which aims to deliver services over both mobile and broadband networks using a disaggregated architecture.
- The Linux Foundation's Edge initiative and its projects like Akraino and EdgeX Foundry that are working on edge computing frameworks and platforms.
- The TM Forum's Business Operating System reference implementation which aims to provide an interoperable software framework for digital services and ecosystems.
- The ETSI's work on
This report describes the 5G requirements, use cases and technologies which are modelling the transformation of the core network and a roadmap how the 3GPP Evolve Packet Core can be modified to become the core for the 5G networks.
Introduction to Rakuten Mobile Virtual Network OperatorKAILASH CHAUHAN
Introduction to Rakuten MVNO (Mobile Virtual Network Operator), designed to leverage Network /Cloud and OTT to become leader in next generation innovation in telecommunications networks ( ORAN/VRAN)
Last update: Feb 7, 2021
5G broadband began to be promoted throughout the United States, it not only brought users a faster Internet, but also brought a new technical architecture designed to further support 5G networks.
As operators around the world are looking for solutions to cope with the growing demand for mobile data, it is necessary to develop 5G technology.
One of those architectures is named device-to-device (D2D) communications, which refers to the communication between devices, which may be cellphones or vehicles. this system opens new device-centric communication that always requires no direct communication with the network infrastructure.
This is good because D2D architecture is predicted to unravel a minimum of a part of the network capacity issue as 5G promises more devices to be connected in faster, more reliable networks.
To understand the new 5G technology, the important point is that it does not only involve faster smartphones. In fact, technologists now call 5G the post-smartphone era.
Higher speeds and lower latency will enable new experiences that require continuous communication between augmented reality and virtual reality, connected cars, smart homes, and machines without lag.
Tonex provided 5G Network Architecture, Planning and Design
Tonex training introduced 5G technology, architecture and protocols. Also discussed 5G air interface and core network technologies and solutions. The course includes investigations of traffic cases and solutions, deployments and products. Covers 3GPP and IMT-2020 methods.
Learning Targets:
Explain the key 5G Principles, Services and Technical aspects
Explain the aim of implementing 5G within the existing mobile ecosystem
Describe a number of the 5G Use Cases and Applications: 3GPP and ITU 5G Use Cases (eMBB, URLLC and mMTC)
List 5G Network Features including: functions, nodes and elements, interfaces, reference points, basic operational procedures and architectural choices
Describe the overall 5G specification
Compare and contrast 5G system with traditional LTE, LTE-A and LTE-A Pro systems (3GPP version)
List and explain 5G RAN and core network architecture
Explain 5G access
Describe the 5G system engineering (access network, 5G core) method
Describe the use of NFV/SDN and network slicing in 5G systems
Learn about 5G radio access networks including 5G New Radio (NR)
Audience:
Engineers
Managers
Marketing and operation personnel
Anyone who want to learn 5G systems including 5G Radio Access Network (RAN), 5G New Radio (NR), 5G core and integration with LTE/LTE-A and LTE-A Pro
Course Outline:
Introduction to 5G Mobile Communication
Key Principles of 5G Systems
5G System Architecture
3GPP 5G System Architecture
5G New Radio (NR)
For More Information:
https://www.tonex.com/5g-training-education-5g-wireless/
Whitepaper: Mobile Networks in a smart digital future - deploying a platform ...Petr Nemec
The Internet of Things poses particular challenges on the mobile networks of the future - this Whitepaper gives an outlook on what CSPs need to consider when choosing a viable upgrade path and migration strategy towards meeting IoT and NB-IoT (narrow band IoT) requirements.
Shunichiro Tejima
Senior Vice President
NEC Corporation
ONS2015: http://bit.ly/ons2015sd
ONS Inspire! Webinars: http://bit.ly/oiw-sd
Watch the talk (video) on ONS Content Archives: http://bit.ly/ons-archives-sd
TECHNIQUES FOR OFFLOADING LTE EVOLVED PACKET CORE TRAFFIC USING OPENFLOW: A C...IJCNCJournal
Cellular users of today have an insatiable appetite for bandwidth and data. Data-intensive applications, such as video on demand, online gaming and video conferencing, have gained prominence. This, coupled with recent innovations in the mobile network such as LTE/4G, poses a unique challenge to network
operators in how to extract the most value from their deployments while reducing their Total Cost of Operations(TCO). To this end, a number of enhancements have been proposed to the “conventional” LTE mobile network. Most of these recognize the monolithic and non-elastic nature of the mobile backend and propose complimenting core functionality with concepts borrowed from Software Defined Networking
(SDN). In this paper, we will attempt to explore some existing options within the LTE standard to address traffic challenges. We then survey some SDN-enabled alternatives and comment on their merits and drawbacks.
This report describes the 5G requirements, use cases and technologies which are modelling the transformation of the core network and a roadmap how the 3GPP Evolve Packet Core can be modified to become the core for the 5G networks.
Introduction to Rakuten Mobile Virtual Network OperatorKAILASH CHAUHAN
Introduction to Rakuten MVNO (Mobile Virtual Network Operator), designed to leverage Network /Cloud and OTT to become leader in next generation innovation in telecommunications networks ( ORAN/VRAN)
Last update: Feb 7, 2021
5G broadband began to be promoted throughout the United States, it not only brought users a faster Internet, but also brought a new technical architecture designed to further support 5G networks.
As operators around the world are looking for solutions to cope with the growing demand for mobile data, it is necessary to develop 5G technology.
One of those architectures is named device-to-device (D2D) communications, which refers to the communication between devices, which may be cellphones or vehicles. this system opens new device-centric communication that always requires no direct communication with the network infrastructure.
This is good because D2D architecture is predicted to unravel a minimum of a part of the network capacity issue as 5G promises more devices to be connected in faster, more reliable networks.
To understand the new 5G technology, the important point is that it does not only involve faster smartphones. In fact, technologists now call 5G the post-smartphone era.
Higher speeds and lower latency will enable new experiences that require continuous communication between augmented reality and virtual reality, connected cars, smart homes, and machines without lag.
Tonex provided 5G Network Architecture, Planning and Design
Tonex training introduced 5G technology, architecture and protocols. Also discussed 5G air interface and core network technologies and solutions. The course includes investigations of traffic cases and solutions, deployments and products. Covers 3GPP and IMT-2020 methods.
Learning Targets:
Explain the key 5G Principles, Services and Technical aspects
Explain the aim of implementing 5G within the existing mobile ecosystem
Describe a number of the 5G Use Cases and Applications: 3GPP and ITU 5G Use Cases (eMBB, URLLC and mMTC)
List 5G Network Features including: functions, nodes and elements, interfaces, reference points, basic operational procedures and architectural choices
Describe the overall 5G specification
Compare and contrast 5G system with traditional LTE, LTE-A and LTE-A Pro systems (3GPP version)
List and explain 5G RAN and core network architecture
Explain 5G access
Describe the 5G system engineering (access network, 5G core) method
Describe the use of NFV/SDN and network slicing in 5G systems
Learn about 5G radio access networks including 5G New Radio (NR)
Audience:
Engineers
Managers
Marketing and operation personnel
Anyone who want to learn 5G systems including 5G Radio Access Network (RAN), 5G New Radio (NR), 5G core and integration with LTE/LTE-A and LTE-A Pro
Course Outline:
Introduction to 5G Mobile Communication
Key Principles of 5G Systems
5G System Architecture
3GPP 5G System Architecture
5G New Radio (NR)
For More Information:
https://www.tonex.com/5g-training-education-5g-wireless/
Whitepaper: Mobile Networks in a smart digital future - deploying a platform ...Petr Nemec
The Internet of Things poses particular challenges on the mobile networks of the future - this Whitepaper gives an outlook on what CSPs need to consider when choosing a viable upgrade path and migration strategy towards meeting IoT and NB-IoT (narrow band IoT) requirements.
Shunichiro Tejima
Senior Vice President
NEC Corporation
ONS2015: http://bit.ly/ons2015sd
ONS Inspire! Webinars: http://bit.ly/oiw-sd
Watch the talk (video) on ONS Content Archives: http://bit.ly/ons-archives-sd
TECHNIQUES FOR OFFLOADING LTE EVOLVED PACKET CORE TRAFFIC USING OPENFLOW: A C...IJCNCJournal
Cellular users of today have an insatiable appetite for bandwidth and data. Data-intensive applications, such as video on demand, online gaming and video conferencing, have gained prominence. This, coupled with recent innovations in the mobile network such as LTE/4G, poses a unique challenge to network
operators in how to extract the most value from their deployments while reducing their Total Cost of Operations(TCO). To this end, a number of enhancements have been proposed to the “conventional” LTE mobile network. Most of these recognize the monolithic and non-elastic nature of the mobile backend and propose complimenting core functionality with concepts borrowed from Software Defined Networking
(SDN). In this paper, we will attempt to explore some existing options within the LTE standard to address traffic challenges. We then survey some SDN-enabled alternatives and comment on their merits and drawbacks.
Ken Ko's presentation from the 2017 Open Networking Summit discussing recent innovation and activity in the NFV and SDN space among broadband providers.
Future European society and economy will strongly rely on 5G infrastructure.
The impact will go far beyond existing wireless access networks with the aim for communication services, reachable everywhere, all the time, and faster. 5G is an opportunity for the European ICT sector which is already well positioned in the global R&D race. 5G technologies will be adopted and deployed globally in alignment with developed and emerging markets’ needs.
Telefónica views on the design, architecture, and technology of 4G/5G Open RA...DESMOND YUEN
This whitepaper is a blueprint for developing an Open RAN solution. It provides an overview of the main
technology elements that Telefónica is developing
in collaboration with selected partners in the Open
RAN ecosystem.
It describes the architectural elements, design
criteria, technology choices, and key chipsets
employed to build a complete portfolio of radio
units and baseband equipment capable of a full
4G/5G RAN rollout in any market of interest.
Towards achieving-high-performance-in-5g-mobile-packet-cores-user-plane-functionEiko Seidel
White Paper Intel SK Telekom
This paper presents the architecture for a user plane function (UPF) in the mobile packet core (MPC) targeting 5G deployments.
A Flexible Network Architecture for 5G SystemsEiko Seidel
In this paper, we define a flexible, adaptable, and programmable architecture for 5Gmobile networks, taking into consideration the requirements, KPIs, and the current gaps in the literature, based on three design fundamentals: (i) split of user and control plane, (ii) service-based architecturewithin the core network (in line with recent industry and standard consensus), and (iii) fully flexible support of E2E slicing via per-domain and cross-domain optimisation, devising inter-slice control and management functions, and refining the behavioural models via experiment-driven optimisation.The proposed architecture model further facilitates the
realisation of slices providing specific functionality, such as network resilience, security functions, and network elasticity. The proposed architecture consists of four different layers identified as network layer, controller layer, management and orchestration layer, and service layer. A key contribution of this paper is the definition of the role of each layer, the relationship between layers, and the identification of the required internal modules within each of the layers. In particular, the proposed architecture extends the reference architectures proposed in the Standards Developing Organisations like 3GPP and ETSI, by building on these while addressing several gaps identified within the corresponding baseline models. We additionally present findings, the design guidelines, and evaluation studies on a selected set of key concepts identified to enable flexible cloudification of the protocol stack, adaptive network slicing, and inter-slice control and management.
The transport network for 5G is much more than just backhaul; it’s the critical backbone connecting the core network all the way to the service layer at the edge via the midhaul and fronthaul. For more details, please visit: https://www.fujitsu.com/us/products/network/products/
Edge / Far Edge: Convergent Access & Transport InfrastructureDmitry Timerkhanov
Evolution of networks and services creates demand for highly distributed architecture. Number of parameters has to be met for the architecture to work at physical, logical and application levels. Proper convergence of transport and access domains within all currently available technologies is key for business case success on that path.
Low-cost wireless mesh communications based on openWRT and voice over interne...IJECEIAES
Technology makes it easier for us to communicate over a distance. However, there are still many remote areas that find it difficult to communicate. This is due to the fact that communication infrastructure in some areas is expensive to build while the profit will be low. This paper proposes to combine voice over internet protocol (VoIP) over mesh network implemented on openWRT router. The routers are performing mesh functions. We set up a VoIP server on a router and enabled session initiation protocol (SIP) clients on other routers. Therefore, we only need routers as a means of communication. The experiment showed very good results, in the line-of-sight (LOS) condition, they are limited to reception distances up to 145 meters while in the non-lineof-sight (NLOS) condition, they are limited to reception distances up to 55 meters.
Emerging Radio Technologies that are mmWave communications, Massive MIMO, Novel Waveforms and Multiple Access techniques etc. will provide ultra-high data rate traffic per user. However, only new Radio techniques implemented in lower layers of legacy networks could not guarantee the all 5G requirements, consequently the new network architecture along with new Radio technologies will emerge to fulfill all 5G requirements.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Ken Ko's presentation from the 2017 Open Networking Summit discussing recent innovation and activity in the NFV and SDN space among broadband providers.
Future European society and economy will strongly rely on 5G infrastructure.
The impact will go far beyond existing wireless access networks with the aim for communication services, reachable everywhere, all the time, and faster. 5G is an opportunity for the European ICT sector which is already well positioned in the global R&D race. 5G technologies will be adopted and deployed globally in alignment with developed and emerging markets’ needs.
Telefónica views on the design, architecture, and technology of 4G/5G Open RA...DESMOND YUEN
This whitepaper is a blueprint for developing an Open RAN solution. It provides an overview of the main
technology elements that Telefónica is developing
in collaboration with selected partners in the Open
RAN ecosystem.
It describes the architectural elements, design
criteria, technology choices, and key chipsets
employed to build a complete portfolio of radio
units and baseband equipment capable of a full
4G/5G RAN rollout in any market of interest.
Towards achieving-high-performance-in-5g-mobile-packet-cores-user-plane-functionEiko Seidel
White Paper Intel SK Telekom
This paper presents the architecture for a user plane function (UPF) in the mobile packet core (MPC) targeting 5G deployments.
A Flexible Network Architecture for 5G SystemsEiko Seidel
In this paper, we define a flexible, adaptable, and programmable architecture for 5Gmobile networks, taking into consideration the requirements, KPIs, and the current gaps in the literature, based on three design fundamentals: (i) split of user and control plane, (ii) service-based architecturewithin the core network (in line with recent industry and standard consensus), and (iii) fully flexible support of E2E slicing via per-domain and cross-domain optimisation, devising inter-slice control and management functions, and refining the behavioural models via experiment-driven optimisation.The proposed architecture model further facilitates the
realisation of slices providing specific functionality, such as network resilience, security functions, and network elasticity. The proposed architecture consists of four different layers identified as network layer, controller layer, management and orchestration layer, and service layer. A key contribution of this paper is the definition of the role of each layer, the relationship between layers, and the identification of the required internal modules within each of the layers. In particular, the proposed architecture extends the reference architectures proposed in the Standards Developing Organisations like 3GPP and ETSI, by building on these while addressing several gaps identified within the corresponding baseline models. We additionally present findings, the design guidelines, and evaluation studies on a selected set of key concepts identified to enable flexible cloudification of the protocol stack, adaptive network slicing, and inter-slice control and management.
The transport network for 5G is much more than just backhaul; it’s the critical backbone connecting the core network all the way to the service layer at the edge via the midhaul and fronthaul. For more details, please visit: https://www.fujitsu.com/us/products/network/products/
Edge / Far Edge: Convergent Access & Transport InfrastructureDmitry Timerkhanov
Evolution of networks and services creates demand for highly distributed architecture. Number of parameters has to be met for the architecture to work at physical, logical and application levels. Proper convergence of transport and access domains within all currently available technologies is key for business case success on that path.
Low-cost wireless mesh communications based on openWRT and voice over interne...IJECEIAES
Technology makes it easier for us to communicate over a distance. However, there are still many remote areas that find it difficult to communicate. This is due to the fact that communication infrastructure in some areas is expensive to build while the profit will be low. This paper proposes to combine voice over internet protocol (VoIP) over mesh network implemented on openWRT router. The routers are performing mesh functions. We set up a VoIP server on a router and enabled session initiation protocol (SIP) clients on other routers. Therefore, we only need routers as a means of communication. The experiment showed very good results, in the line-of-sight (LOS) condition, they are limited to reception distances up to 145 meters while in the non-lineof-sight (NLOS) condition, they are limited to reception distances up to 55 meters.
Emerging Radio Technologies that are mmWave communications, Massive MIMO, Novel Waveforms and Multiple Access techniques etc. will provide ultra-high data rate traffic per user. However, only new Radio techniques implemented in lower layers of legacy networks could not guarantee the all 5G requirements, consequently the new network architecture along with new Radio technologies will emerge to fulfill all 5G requirements.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
1. 5GNETWORK CONVERGENCE AND
ORCHESTRATION INITIATIVES BY BBF,
ONF, LF EDGE, TM FORUM AND ETSI
Massimo Banzi, Cecilia Corbi, Luca Pesando, Mauro Tilocca
The Broadband Forum (BBF) is a
non-profit industry organization,
is focused on engineering smarter
and faster broadband networks.
Many of its Technical Reports have
become de-facto standards refer-
enced by operators and manufac-
turers to build up the existing ultra-
broadband networks in the last 25
years.
In the 2008-10 timeframe the BBF
engaged a coordination activity
with 3GPP about Fixed Mobile Con-
vergence looking at potential con-
vergence architectures.
The advent of 5G, represents a ines-
timable opportunity to specify con-
verged architectures and interfaces
and connect any kind of access to a
Unified 5G Core.
Since 2017, the BBF has launched the
5G Project within its Wireline Wire-
less Convergence (WWC) Work Area.
The main deliverables of this project
are:
• Study Documents related with
5G topics applicable to broad-
band and back-/front-hauling
networks to share with 3GPP.
More specifically these are: SD-
406 End-to-End Network Slic-
ing, SD-407 5G Fixed Mobile
Convergence Study and SD-420
R1bis 5G Fixed Mobile Conver-
gence Study
• Normative specifications in the
form of BBF TRs that define
functions and requirements for
devices compatible with the
converged 5G network
The workplan of this project, phased
with 3GPP releases is shown in the
picture Figure 1.
The current BBF work on 5G Fixed
Mobile Convergence focuses on five
scenarios described in the figure be-
low, with different cases in terms of
Residential Gateway (RG) type, ac-
cess network and interfacing model
with the 5G Core.
1. Fixed Wireless Access (5G-RG)
– The 5G-RG is connected over
the NG-RAN.
2. Integration in Direct Mode (5G-
RG)– The RG is connected over the
wireline access network. An Ac-
cess Gateway Function (AGF) me-
diates between the wireline access
network and the 5G core network,
based on N2 and N3 interfaces.
GOAL
Common Core Network across
Wireline and Wireless Access Network
3GPP
Normative Work
5GPh2 - R16
3GPP
Normative Work
5GPh1 - R16
FMC
Issue List
3GPP
StudyWork
5GPh2 - R15
3GPP
StudyWork
5GPh1 - R15
BBF
Normative Work
5G
BBF
SD-407/
SD-420
5GFMC
BBF
5G Studies
BBF
5G Studies
BBF
SD-406
Net Slicing
Specified new Access Gateway
Function and modifications on RG,
ACS, Access Nodes, ect..
Recommendation to integrate fixed
components with 3GPP defined 5G
interfaces.
Intermediate “Sync” with 3GPP
Recommendation to use network
slicing in fixed and FMC networks
- Session Management
- RG authentication
- QoS
- Etc...
2020+
2019
2017-2018
Up to 2016
5G FMC standardization timetable
anno 28 1/2019
notiziariotecnico
8 9
2. 5G Fixed Mobile Convergence scenarios
3. Integration in Adaptive Mode
(FN-RG) – Similar to (2), but FN-
RG does not support N1, so the
AGF acts as end point of N1 on
behalf of the FN-RG.
4. Interworking (FN-RG) – The
session is managed by a BNG.
Services that are based on 5G
core network are passed to the
5G core via a Fixed Mobile Inter-
working Function (FMIF).
5. Coexistence (FN-RG) - This is
not a converged session model,
as these sessions are not part of
the 5G core network. However,
coexistence is required to allow
services that are not supported
by the 5G core network to be
available in a converged service
provider network.
The key goal in all this is to con-
tribute to the specification of the
3GPP’s Nx interfaces to the 5G Core
for wireline access concretely lead-
ing to a unified 5G architecture and
interface specification.
Overall the following 5G activities
are carried out by the BBF:
• 5G Fixed Mobile Convergence
• Common Core across Wireline
and Wireless Access Networks
• Direct access to 5G core – full
operational integration
• Enabler for seamless service
delivery & operational effi-
ciency
• 5G Fixed Access and Transport
• Backhaul & Fronthaul: Access
• Routing & Transport: enhance-
ments for 5G covering capacity,
performance reliability & deter-
minism
• Other 5G Work
• Networking Slicing in User Plane
and Control Plane and within
the Transport Network
• Time Critical Applications: dis-
aggregation policy, require-
ments, specifications of APIs.
ONF initiatives on
network convergence
ONF (Open Networking Founda-
tion – www.opennetworking.org) is a
non-profit operator led consortium
that hosts a consistent number of
projects building solutions by lev-
eraging network disaggregation,
white box economics, open source
software.
ONF has several initiatives running
to build unified platforms by intro-
ducing hardware disaggregation
and functional decomposition of
mobile and broadband components.
The Converged Multi-Access and
Core (COMAC) and Open Evolved
Mobile Core (OMEC) are two key
projects to enable this evolution:
OMEC is a proposed commercial im-
plementation of the Evolved Packet
Core (EPC), while COMAC initiative
is aimed at delivering next-genera-
tion services over both mobile and
broadband networks, regardless of
access technology.
COMAC is an ONF Reference De-
sign (RD) supported by carriers such
as AT&T, China Unicom, Deutsche
Telekom, Google and by a supply
chain ecosystem including Adtran,
Intel, Radisys, GSLab and HCL.
The ONF RDs represent a particu-
lar assembly of components that
are required to build a deployable
platform. They are “blueprints” de-
veloped by ONF’s Operator mem-
bers to address specific use cases
for the emerging edge cloud.
Scope of COMAC is to program net-
work slices combining various ac-
cess and core technologies to sup-
port a wide variety of use cases,
deployment options and service
offerings. COMAC will leverage SDN
and cloud techniques to create the
necessary converged access and
converged core capabilities on a sin-
gle platform.
Essentially COMAC is made by a
Converged Access Architecture, built
on disaggregated RAN (leveraging
the O-RAN RU/DU/CU architecture),
disaggregated mobile core, and
disaggregated Broadband Network
Gateway (BNG) components. Ele-
ments from each are then redistrib-
uted and aggregated into a unified
access layer, creating a SDN pow-
ered control plane and P4 powered
user plane that each contain ele-
ments of the RAN CU, Mobile Core
and BNG.
About the Converged Core, COMAC
integrates unified subscriber man-
agement, blending Mobile MME,
HSS and BNG-Authentication and
billing functions into a common
platform.
Following pictures Figure 3 (as from
ONF site) represent COMAC Archi-
tecture and which are the compo-
nents used to build it.
COMAC - High Lever RD Architecture
1 EPC connects mobile subscribers to the carrier’s infrastructure and to the internet.
anno 28 1/2019
notiziariotecnico
10 11
3. OMEC is serving as an upstream
project to COMAC RD and it is an
open source Evolved Packet Core
(EPC [note 1]), designed to be used
as a stand-alone EPC, compliant
with 3GPP Release 13 and built us-
ing an NFV (Network Function Vir-
tualization) architecture optimized
for Intel platforms. OMEC provides
full connectivity, billing and charg-
ing capabilities. It is also designed
for lightweight and cost-effective
deployments, including IoT and
edge applications. As in the picture
below OMEC includes EPC compo-
nents, operational tools including
CLI, Logging and Statistics Inter-
face APIs to VNFs, CI/CD tools for
ture (i.e. in the access / distribu-
tion segments).
Edge computing as an evolution of
cloud computing brings applica-
tion hosting from centralized data
centers down to the network edge,
closer to consumers and the data
generated by applications. Edge
computing then opens the network
edge for applications and services
and it is one of the key technologies
required to support low latency to-
gether with mission critical and fu-
ture IoT services.
5G networks are a key future tar-
get environment for Edge comput-
ing deployments and in this sce-
nario a lot of initiatives have been
started such as: MobileEdgeX the
edge computing company found-
ed by Deutsche Telekom (https://
mobiledgex.com/), ETSI ISG MEC
(https://www.etsi.org/technologies/
multi-access-edge-computing) to
define standards specifications,
Open Source Projects such as
Akraino launched by ATT in 2018
and the new Kinetic Edge Alliance,
an industry alliance of software,
hardware and networking com-
panies to accelerate the rollout of
edge computing.
Just in February 2019, the Linux
Foundation, a consortium that pro-
motes and standardizes Linux Oper-
ating System and other open source
deployment configuration and au-
tomation.
LF EDGE
initiative
5G is not just a new radio access
and core infrastructure, but it
will integrate fixed-mobile net-
works with highly distributed
Cloud-Edge Computing facilities
composed by big-medium Data
Centers (replacing current Opera-
tor’s PoPs) and a large number of
small-medium Data Centers at
the edge of the current infrastruc-
computing applications running
in virtual machines and contain-
ers to support reliability and per-
formance requirements.
• EdgeX Foundry: focused on de-
veloping a common platform for
the IoT edge;
• Open Glossary of Edge Comput-
ing: dedicated to edge computing
definitions, developing a glossary
and ensuring that projects share
a common vocabulary;
• Home Edge Project: focused on
IoT for end-user devices;
• Edge Virtualization Engine (EVE):
a framework, based on APIs, for
edge application management in
the enterprise.
TM Forum Digital
Services
TM Forum (www.tmforum.org) is
the global industry association that
drives digital transformation of the
communications industry through
collaboration.
BOS (Business Operating System)
is the answer of TMF to the need
to create a common and fully in-
teroperable software framework for
CSPs’ core and future business, their
future digital services and the eco-
systems behind them (https://vimeo.
com/317162198).
The core BOS kernel is composed
of a Design Framework (imple-
mented by the BOS Design Cent-
er) and an Execution Framework
in charge of executing functions
OMEC Components
technologies, launched the LF
Edge a new ‘umbrella organisation’
(www.lfedge.org) aimed to create an
open and interoperable framework
to address and solve the problem
of the fragmentation of the edge
market. This new organization, sup-
ported by more than 60 industry
members, will initially take charge
of these five projects:
• Akraino Edge Stack: founded by
ATT it provides a collection of
software tools that enable crea-
tion of edge-optimized cloud ser-
vices and applications, based on
either VMs on containers. To seed
the project, AT&T provides code
designed for carrier-scale edge
anno 28 1/2019
notiziariotecnico
12 13
4. supporting the Core Commerce
Management and the Intelligence
Management blocks of ODA, to
create an agile IT.
ODA is the TM F reference archi-
tecture which sets a new vision for
operational and business support
systems (OSS/BSS), and a de facto
standard for the design of open
digital platforms (see picture where
ODA blocks.
A reference implementation of BOS
is being developed in a DTW 2019
Catalyst to validate and showcase
the ODA architecture and to check
API + data models completeness
and consistency, to federate ener-
gies towards the same ODA target,
and to check compliance of ven-
dors’ solutions. It will expose pub-
lic open APIs towards the Engage-
ment Management and the Party
Management functional block and
since it does not enforce any En-
gagement Management by default,
it allows a total freedom to differ-
entiate through a fully customized
customer experience on all chan-
nels.
One interesting aspect of the BOS
Reference Implementation is the
complementarity of its architecture
to network Operating System, by
natively interworking with ONAP
(www.onap.org) based network fac-
tories. Starting from Beijing Release,
ONAP used already TMF Open APIs
exposing northbound the service-
Catalog, the serviceOrder, and the
serviceInventory and in the future
other Open APIs are expected.
TheseAPIswillbeusedbyBOStocom-
municate with the Production Block.
Having an architectural approach
close to ONAP - BOS is expected to
have the same clear distinction be-
plementation will not replace a full
commercial “commerce manage-
ment" platform, but in the long run,
commercial solutions are expected
to leverage this reference imple-
mentation and add commercial in-
novative features.
ETSI Artificial
Intelligence to
network
management
ETSI-ISG ENI (Experiential Network
Intelligence) is active since February
2017 to define a standard for the ap-
plication of Artificial Intelligence (AI)
to networking and, in particular, to
tions, new configurations, addition
or removal of functionalities.
The aim of ETSI ISG ENI is in fact to
specify a Cognitive Network Man-
agement system incorporating a
closed loop control approach, which
is based on a “monitor-analyze-
plan-execute” model and is en-
hanced by learning capabilities.
ETSI ISG ENI has so far defined and
published the Terminology, Use Cases
and the Requirements for a Release
1 of the specifications together with
a Gap-Analysis of Context-Aware Pol-
icy Management exploiting AI. The
tween design and execution frame-
works - the same tools used for the
development of ONAP can be re-
used and therefore making easier
the BOS kernel development.
According to TM F, there is a strong
link with ONAP modules: ONAP SDC
and DCAE modules could poten-
tially be leveraged to develop BOS
design center. The BOS orchestra-
tor could also be implemented on
Camunda BPM engine, the Active
Inventory might be a good starting
point for the Customer Products
and Offers Installed Base. DMaaP
is a generic powerful mechanism to
collect data and implement event
notifications. AAF (application au-
thorization framework) is an inter-
esting role based (and also attribute
based) access control framework for
all ONAP subsystems.
In the short term (between now and
2020), an opensource reference im-
network management and operation,
addressing increasing levels of auto-
mation and self-management (auto-
nomicity, according to IEEE definition).
The application of AI starts in fact
from the assistance (to the network
operator) for diagnostic and fault
management purposes on tradi-
tional network systems (low or no
automation), and is expected to be-
come more and more penetrating
and significative with the increasing
level of virtualization. AI implemen-
tation will be essential in the final
picture of the extensively virtualized
and sliced network model proposed
for 5G full exploitation, targeting
full autonomicity, i.e. automation of
the network adaptation to detected
changes in the operation condi-
Party Management
Engagement
Management
Front-end
API Hub
Intelligence
Management
Core Commerce Management
Decoupling and integration
Decoupling and integration
Production
Operationale Business Processes
BOS Execution Framework
BOS Execution Framework
ONAP Design Framework
ONAP Design Framework
5
ENI high level architecture with
interconnecting interfaces
anno 28 1/2019
notiziariotecnico
14 15
5. http://www.telecomitalia.com/tit/it/notiziariotecnico/presentazione.html
group is presently working at a de-
tailed Architecture by specifying the
details of the high level representa-
tion in "ENI high level architecture with
interconnecting interfaces".
Also the integration of ENI system
with the network architectures de-
fined by the main refence groups
has been addressed. For instance
the integration with ETSI NFV/
MANO architecture is reported in
figure.
ENI Architecture will be released in
the next moths, as well as a defini-
tion of the different categories for
the autonomicity degree of AI as-
sisted networks operation and man-
agement.
ETSI ISG ENI is planning a release
2 of its specifications, following
Integration of ENI system with
ETSI NFV/MANO architecture
Massimo Banzi massimo.banzi@telecomitalia.it
laureato in Fisica, è entrato in azienda nel 1994. Dal 2011 si occupa di standardizzazione
per “Cloud Computing", “Big Data Analytics” e “Management Support Systems evolution”
all’interno di vari enti di normativa.
Precedentemente è stato responsabile della realizzazione di linee guida per l’utilizzo
di software open source in sistemi Business critical in Telecom Italia IT e fino al 2007
responsabile del Configuration Management Competence Center nella Software Factory
di Telecom Italia dove si occupava di tutte le attività inerenti l’identificazione, il build ed il
rilascio del software.
Ha svolto anche attività accademica presso l’Università di Bolzano nella Facoltà di
Computer Sciences fino al 2012
Cecilia Corbi ceciliamaria.corbi@telecomitalia.it
Laureata in Matematica, è entrata in Azienda nel 1989 ed è Senior Project Manager
nel gruppo Technology Innovation Management - Standard Coordination & Industry
Influencing. Si è occupata di attività di innovazione interna ed è stata responsabile di
diversi progetti per lo sviluppo e messa in campo di servizi innovativi per gli Operatori
Mobili delle consociate estere.
E’ responsabile del coordinamento delle attività di standardizzazione e partecipazione
alle Open Communities per quanto riguarda la Virtualizzazione della rete e le tematiche di
Orchestrazione ed Automazione. Ha ricoperto diversi ruoli di chairmanship in diversi enti e
attualmente rappresenta Telecom Italia in ETSI NFV, ETSI ZSM ed e’ membro del Board di
Linux Foundation Networking Project
Luca Pesando luca.pesando@telecomitalia.it
In Azienda dal 1992, è coordinatore delle attività di standardizzazione su IPTV e media
delivery, Accesso Fisso e Trasporto dal 2006.
Dal 2008 al 2014 è stato deputy Board Director per Telecom Italia dell’Open IPTV Forum e
dal 2012 ne è stato il Vice-President.
Fino a febbraio 2015 è stato Chairman dell’ETSI Project E2NA (End-to-end Network
Architecture) ed è attualmente Chairman del Working Group M493 del TC NTECH.
Prima del 2006 ha seguito varie attività in Telecom Italia con ruoli di project manager,
nell’ambito di progettazione di sistemi di interconnessione ottica e sistemi di sicurezza per
comunicazioni fisse e mobili. Ad inizio anni 2000 ha fatto parte del team di progetto del
Backbone Nazionale Integrato.
Prima di entrare in Telecom Italia ha lavorato per tre anni presso l’Università e la sezione
INFN di Torino dopo il conseguimento del Ph.D in fisica
Mauro Tilocca mauro.tilocca@telecomitalia.it
ingegnere in telecomunicazioni, è in Azienda dal 1994. Si è occupato inizialmente di reti
di trasporto e in seguito di rete di accesso fisso in particolare di tecnologie in rame. È
stato responsabile delle attività di scouting, specifica, qualificazione e interoperabilità di
apparati DSL a supporto dello sviluppo della rete di accesso broadband e ultra‑broadband
(NGAN). Attualmente è responsabile di un progetto che definisce le specifiche per soluzioni
FTTdp e test list di validazione e si occupa dello studio e scouting di soluzioni SDN ed NFV
in accesso.
Partecipa alle attività di standardizzazione del Broadband Forum ed è membro del Board
of Directors dal 2008. È inoltre chairman del Service Provider Action Council e co‑director
dell’Innovation Work Area e membro dello Steering Committee
the publication of the Architec-
ture, to address the APIs needed
for the ENI subsystem and the
information model, and a further
enhancement of the architecture
including interfaces and protocols,
detailed functional flow diagrams,
sequence and interaction dia-
grams, state machine diagrams,
Reference Points. Security is con-
sidered a fundamental aspect to
be addressed too ■
anno 27 3/2018 17
notiziariotecnico
16