This document discusses EITC's strategy for implementing a cloud-based future network architecture. It highlights how 5G, IoT, edge computing, and network function virtualization (NFV) will open new opportunities for services and revenue streams. The document outlines EITC's plan to build telco cloud infrastructure using NFV and SDN to gain agility, optimize costs, and efficiently scale for changing demands. It also discusses the need to reorient operations and processes to maximize the benefits of the new architecture and address new security challenges in a cloud environment.
The document discusses the evolution of IoT towards a super-connected world. It notes that IoT, together with technologies like cloud computing, big data analytics, and machine learning can help create new opportunities and business models. Key points discussed include:
- 3GPP has introduced NB-IoT and LTE-M cellular technologies to address the challenges of connecting a massive number of low-power IoT devices over wide areas.
- NB-IoT is designed for ultra-low-end IoT applications like smart meters and smart parking that require long battery life and wide coverage. LTE-M supports higher data rates for applications like tracking and wearables.
- Service providers need to adopt a strategy for
This document discusses how 5G networks can enable deterministic, high-performance networks for business-to-business applications across various industries. It outlines how 5G core networks are being transformed into cloud-native, distributed architectures using microservices to meet diverse industry requirements. Key points include:
1) 5G networks can shift from best-effort consumer networks to providing differentiated, deterministic capabilities required by industries like autonomous vehicles, smart grids, and healthcare.
2) The 5G core network is being modernized using cloud technologies to improve agility, openness, and end-to-end service quality assurance critical for expanding to business services.
3) A cloud-native, microservices-based architecture allows the
This document discusses how communications service providers can transform into next-generation IoT service providers. It outlines that SPs should develop scalable platforms and services capabilities, select an IoT-enabled cloud platform, define partnership ecosystems, and decide how to evolve technologies. SPs must identify target markets and services portfolios to meet the diverse requirements of IoT beyond just connectivity.
The document discusses concepts for 5G networks, including:
1. 5G aims to provide a unified system to support a wide range of use cases with enhanced connectivity, capacity, and low latency. It will build on LTE and introduce a new 5G radio and core network.
2. 5G will support enhanced mobile broadband, massive IoT connectivity, and ultra-reliable low latency communications. Initial deployments may use LTE and 5G networks together before standalone 5G is available.
3. The 5G new radio will provide flexible design to support different use cases and improve efficiency over LTE. It will integrate with existing LTE networks during early deployments.
5G-Enabled Personal Computers Competitive Intelligence Report Netscribes
A deep dive competitive analysis of the top manufacturers of 5G-enabled PCs and how they stack up
To purchase the full report, write to us at info@netscribes.com
https://www.netscribes.com/subscriptions/5g/5g-enabled-personal-computers-competitive-intelligence-report/
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economyEricsson
The 5G network evolution has opened up an abundance of new business opportunities for communication service providers (CSPs) in verticals such as industrial automation, security, health care and automotive. In order to successfully capitalize on them, CSPs must have business support systems (BSS) that are evolved to manage complex value chains and support new business models. Optimized information models and a high degree of automation are required to handle huge numbers of devices through open interfaces.
This Ericsson Technology Review article explains how 5G-evolved BSS can help CSPs transform themselves from traditional network developers to service enablers for 5G and the Internet of Things, and ultimately to service creators with the ability to collaborate beyond telecoms and establish lucrative digital value systems.
Cellular Internet of Things white paperBjörn Ekelund
This document discusses potential future technologies for machine-to-machine (m2m) communications over cellular networks. It predicts that over 20 billion devices will be wirelessly connected by 2020 as part of the Internet of Things. Existing cellular technologies do not fully meet the needs of the mass IoT market, which requires ubiquitous connectivity, deep indoor coverage, very low-cost devices, and long battery life. The document proposes two options for a new cellular IoT technology: 1) evolving LTE to better support IoT needs or 2) developing a dedicated new radio access technology optimized for IoT. Either approach would need to provide the key characteristics of using licensed spectrum, supporting low-cost devices, very low power consumption, small pay
Enabling a Big Vision for 5G with Small Cells - CyientPercy-Mitchell
5G promises to transform the way we live and work, offering extremely low latency of less than 10 milliseconds coupled with ultra-high-speed broadband networks. And small cells are an indispensable component of next-generation networks
The document discusses the evolution of IoT towards a super-connected world. It notes that IoT, together with technologies like cloud computing, big data analytics, and machine learning can help create new opportunities and business models. Key points discussed include:
- 3GPP has introduced NB-IoT and LTE-M cellular technologies to address the challenges of connecting a massive number of low-power IoT devices over wide areas.
- NB-IoT is designed for ultra-low-end IoT applications like smart meters and smart parking that require long battery life and wide coverage. LTE-M supports higher data rates for applications like tracking and wearables.
- Service providers need to adopt a strategy for
This document discusses how 5G networks can enable deterministic, high-performance networks for business-to-business applications across various industries. It outlines how 5G core networks are being transformed into cloud-native, distributed architectures using microservices to meet diverse industry requirements. Key points include:
1) 5G networks can shift from best-effort consumer networks to providing differentiated, deterministic capabilities required by industries like autonomous vehicles, smart grids, and healthcare.
2) The 5G core network is being modernized using cloud technologies to improve agility, openness, and end-to-end service quality assurance critical for expanding to business services.
3) A cloud-native, microservices-based architecture allows the
This document discusses how communications service providers can transform into next-generation IoT service providers. It outlines that SPs should develop scalable platforms and services capabilities, select an IoT-enabled cloud platform, define partnership ecosystems, and decide how to evolve technologies. SPs must identify target markets and services portfolios to meet the diverse requirements of IoT beyond just connectivity.
The document discusses concepts for 5G networks, including:
1. 5G aims to provide a unified system to support a wide range of use cases with enhanced connectivity, capacity, and low latency. It will build on LTE and introduce a new 5G radio and core network.
2. 5G will support enhanced mobile broadband, massive IoT connectivity, and ultra-reliable low latency communications. Initial deployments may use LTE and 5G networks together before standalone 5G is available.
3. The 5G new radio will provide flexible design to support different use cases and improve efficiency over LTE. It will integrate with existing LTE networks during early deployments.
5G-Enabled Personal Computers Competitive Intelligence Report Netscribes
A deep dive competitive analysis of the top manufacturers of 5G-enabled PCs and how they stack up
To purchase the full report, write to us at info@netscribes.com
https://www.netscribes.com/subscriptions/5g/5g-enabled-personal-computers-competitive-intelligence-report/
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economyEricsson
The 5G network evolution has opened up an abundance of new business opportunities for communication service providers (CSPs) in verticals such as industrial automation, security, health care and automotive. In order to successfully capitalize on them, CSPs must have business support systems (BSS) that are evolved to manage complex value chains and support new business models. Optimized information models and a high degree of automation are required to handle huge numbers of devices through open interfaces.
This Ericsson Technology Review article explains how 5G-evolved BSS can help CSPs transform themselves from traditional network developers to service enablers for 5G and the Internet of Things, and ultimately to service creators with the ability to collaborate beyond telecoms and establish lucrative digital value systems.
Cellular Internet of Things white paperBjörn Ekelund
This document discusses potential future technologies for machine-to-machine (m2m) communications over cellular networks. It predicts that over 20 billion devices will be wirelessly connected by 2020 as part of the Internet of Things. Existing cellular technologies do not fully meet the needs of the mass IoT market, which requires ubiquitous connectivity, deep indoor coverage, very low-cost devices, and long battery life. The document proposes two options for a new cellular IoT technology: 1) evolving LTE to better support IoT needs or 2) developing a dedicated new radio access technology optimized for IoT. Either approach would need to provide the key characteristics of using licensed spectrum, supporting low-cost devices, very low power consumption, small pay
Enabling a Big Vision for 5G with Small Cells - CyientPercy-Mitchell
5G promises to transform the way we live and work, offering extremely low latency of less than 10 milliseconds coupled with ultra-high-speed broadband networks. And small cells are an indispensable component of next-generation networks
This document summarizes key technology trends for 2019 according to an IABM analyst. It discusses drivers of change like digital warfare as more companies launch direct-to-consumer offerings. It also covers shifts in buying trends toward partnerships and cloud/software. The document tracks adoption of IP, cloud computing, and artificial intelligence and outlines opportunities and challenges for each technology.
McKinsey Global Institute Connected World-discussion-paper_february-2020DESMOND YUEN
The promise of 5G has captured the attention of business leaders, policy makers, and the media. But how much of that promise is likely to be realized anytime soon?
With the first true high-band 5G networks already live, we set out to take a realistic view of how and where connectivity could be deployed and what it can enable over the next 10 years. But 5G is not appearing in isolation. This research takes a more expansive view of connectivity to include other technologies, ranging from fiber and satellites to Wi-Fi and short-range technologies.
Despite the hype about remote surgery and Star Trek–style holodecks in everyone’s living rooms, the future is not solely happening on the frontier. Existing connectivity technologies are expanding and evolving, with new standards that boost network performance—and they are much less capital-intensive. We have identified an enormous array of use cases that can run on this type of upgraded backbone. Companies do not have to wait for high-band 5G to implement new systems and go after the resulting productivity gains.
To illustrate what is possible, this research looks at how connectivity could be deployed in mobility, healthcare, manufacturing, and retail. The use cases we identified in these four commercial domains alone could boost global GDP by $1.2 trillion to $2 trillion by 2030. This implies that the value at stake will ultimately run trillions of dollars higher across the entire global economy.
Mobile data traffic volumes are expected to increase by a factor of four by 2025, and 45 percent of that traffic will be carried by 5G networks. To deliver on customer expectations in this rapidly changing environment, communication service providers must overcome challenges in three key areas: building sufficient capacity, resolving operational inefficiencies through automation and artificial intelligence, and improving service differentiation. This issue of ETR magazine provides insights about how to tackle all three.
4G LTE over satellite is arriving to the market at a faster pace than 2G and 3G did when they emerged. 4G carries the promise of a true mobile broadband experience with high volumes, higher speeds and enhanced efficiency, blurring the lines between cellular and wifi. Mobile operators will nevertheless wonder if 4G can be even more successful than its predecessors, and what value it really brings to the subscriber. They will also want to know if there are specifi c characteristics required to run the service over satellite, and if it is possible to optimize the traffi c just like in 2G and 3G to gain bandwidth and decrease the OPEX. Lastly, can 4G deployments be future proof in light of the upcoming 5G standards?
Reduce Cost and Increase Innovation with Converged Voice and DataReadWrite
It's no question that advanced voice, data and networking communications provide the enterprise with the infrastructure for innovation.
But the recession has had its impacts. Organizations are tight on budget. They need to see that their technology investments spark innovation and coast less.
This report explores how voice and data networks can be converged to drive innovation and lower costs for the entire organization.
Ericsson Technology Review: The future of cloud computing: Highly distributed...Ericsson
The growing interest in cloud computing scenarios that incorporate both distributed computing capabilities and heterogeneous hardware presents a significant opportunity for network operators. With a vast distributed system (the telco network) already in place, the telecom industry has a significant advantage in the transition toward distributed cloud computing.
This Ericsson Technology Review article explores the future of cloud computing from the perspective of network operators, examining how they can best manage the complexity of future cloud deployments and overcome the technical challenges. Redefining cloud to expose and optimize the use of heterogeneous resources is not straightforward, but we are confident that our use cases and proof points validate our approach and will gain traction both in the telecommunications community and beyond.
5G wireless networks will support massive connectivity and capacity increases to enable new technologies and applications between 2020 and 2030. 5G will realize ultra-fast and low latency connectivity for both people and devices through advanced wireless technologies built upon existing standards like LTE as well as new radio access technologies. Key technology drivers for 5G include developments in mobile broadband speeds, spectrum and infrastructure to support applications like smart cities, industrial automation, and virtual and augmented reality.
5G will bring significantly higher data rates and lower latency compared to previous generations of wireless technology. It will enable a wide range of new applications and services by supporting connectivity for billions of devices. 5G networks will integrate both new and existing radio technologies to achieve this, including technologies like massive MIMO antennas and expanding operations into new spectrum bands. While the full 5G ecosystem is still being developed, it has the potential to disrupt many industries and business models through its dramatically improved connectivity capabilities.
Microsoft Telecommunications Industry News | April 2021Rick Lievano
I’m amazed to see our tremendous growth in the industry in this quarter. There’s plenty to be optimistic
about. With COVID vaccines readily available to more and more people worldwide in the coming months,
we will hopefully begin transitioning back to the post-COVID landscape. I know I’m not alone when I say
that I can’t wait to get back into in person customer and partner meetings. We’re forging ahead with
getting customers ready for the new normal. Proud to see TIM Brazil to move 100% of their datacenters to
the cloud.
If one thing’s for sure, organizations in the telco space have transformed rapidly in this unprecedented
year. I’m excited to share The Network, Microsoft’s newest podcast series focused on digital resilience and
acceleration of technology for the telco industry, with stories from business leaders around the globe.
Jfall 2019 - Driving the energy transition with javaCaspar Derksen
Want to know how TenneT manages the national high-voltage grid? And how we rebuilt our legacy system for balancing demand and supply of electricity in a volatile energy market? In this talk, we will show how we were able to implement a modular event-driven microservices architecture in a traditional JEE7 infrastructure environment. We will discuss the trade-offs that we made, lessons learned in realizing the system, and how we will further evolve to our cloud platform. In addition, we will give an insight into our agile transformation journey, and how this was essential to the success of the project.
The document describes Sushant Mittal's 6 month internship project at Connectem Software Systems Private Limited where he automated LTE call flows and developed a Policy and Charging Rules Function (PCRF) simulator. The project involved using Robot Framework to automate common LTE procedures like attach, detach, handover. It also included developing a wrapper in Python to run an existing PCRF simulator called Seagull.
Including VoIP over WLAN in a Seamless Next-Generation ...Videoguy
This document discusses including voice over IP (VoIP) capabilities over wireless local area networks (WLANs) in a seamless next-generation wireless environment. It addresses key issues for deploying VoIP over WLANs such as quality of service, call control, network capacity, and architecture. It also analyzes WLAN network capacity for supporting VoIP, including considerations for over-subscription of voice services, throughput requirements for voice and media applications, and capacity planning for enterprise and home WLAN deployments. The goal is to provide an overview of critical issues for implementing VoIP over WLAN applications.
The document discusses 5G mobile technology and its evolution from earlier generations. It provides details on:
1) How 5G will offer unprecedented call volume and data transmission speeds compared to previous technologies.
2) The network architecture of 5G, which will integrate different wireless technologies like PANs, WANs and cellular networks to provide seamless global connectivity using IPv6 addressing.
3) The mix-bandwidth data path design for 5G, which efficiently utilizes the resources of multiple overlapping wireless networks like pico-cells, micro-cells and macro-cells that cover the same area.
Technology, Media And Telecommunications Prediction 0f 2020aakash malhotra
According to the experts from deloitte india, media, telecommunications and technology industries are going to flourish like never before. See More : https://www2.deloitte.com/in/en/pages/technology-media-and-telecommunications/articles/tmt-predictions-2020.html
This document discusses the direction of 5G evolution and 6G mobile communication technologies. It outlines considerations for 5G evolution, including improving millimeter wave coverage and uplink performance for industrial use cases. It then discusses expectations for 6G technologies in the 2030s, such as solving social problems, advanced cyber-physical fusion, and the need for ubiquitous high-speed connectivity everywhere. Key requirements for 6G are identified, such as extreme high data rates over 100Gbps, low latency, massive connectivity, and coverage in all environments including sky, sea and space. Use cases like high-fidelity sensory services and real-time data transmission for industry and AI are presented.
Performance Analysis and Optimization of Next Generation Wireless NetworksUniversity of Piraeus
The Fifth Generation (5G) networks, including the 5G Vehicular Cloud Computing (5G-VCC) systems, have evolved rapidly offering multiple services to users. The operating principles of vehicular networks, Cloud Computing (CC), Fog Computing (FC), Mobile Edge Computing (MEC) and Software Defined Networks (SDN) are applied to 5G infrastructures. In a 5G-VCC system, the vehicles are equipped with On-Board Units (OBUs) which communicate with each other as well as with Road Side Units (RSUs). Each RSU interacts with a Cloud infrastructure which offers vehicular services with strict Quality of Service (QoS) requirements, including Driver Assistance (DA), Passengers Entertainment and Information (PEnI) and Medical (MED) services. Dense deployments of 5G access networks are also implemented, called Ultra Dense Networks (UDNs), aiming to support high data rates produced by an increased number of vehicular users. In this environment, heterogeneous technologies are used to transfer the network services to vehicles. Optimal manipulation of the communication resources is required, while at the same time vehicular users should always obtain connectivity to the most appropriate network access technology, in order the constraints of the vehicular services to be satisfied. In this thesis, existing schemes for resource allocation as well as for mobility management are studied, while novel solutions are proposed for each topic.
This document discusses the deployment of Long-Term Evolution (LTE) networks and the importance of in-building solutions to handle increasing mobile data traffic indoors. It notes that LTE will see its first deployments this year and will reinforce the "islands of life" concept by providing continuity of voice and data services in locations like workplaces, homes, malls and train stations. Providing quality in-building coverage presents challenges around architecture, design, installation, optimization and operations that require well-considered solutions. The document outlines best practices for selecting the right in-building LTE solution.
The document provides a summary of key announcements and trends from the 2014 Mobile World Congress conference around networks, devices, and services. Some of the main points discussed include the growing focus on network virtualization and small cell deployments to improve networks, efforts to lower smartphone prices including the possibility of a $25 smartphone, and increasing emphasis on digital services and connectivity of devices and things beyond mobile phones.
The semiconductor industry is constantly confronted by design and device-integration challenges, since IoT applications and consumers demand small, portable, and multi-functional electronics. With hardware designing constantly evolving, a new class of designers is stepping up to take on these challenges, using various silicon implementations. The advantages of system-on-a-chip (SoC) over other silicon implementations make it the most suitable solution for intelligent edge computing in IoT applications.
The rise of IoT products and platforms has led to a number of challenges that need to be addressed to explore the full potential of IoT systems and their related emerging applications. This report includes a comprehensive analysis of the SoC-IoT space, highlighting the major trends and opportunities across the ecosystem.
To purchase the full report, write to us at info@netscribes.com
Visit www.netscribes.com
5G will radically change digital services and security by enabling decentralized, intelligent networks that can react to individual user needs. It will allow mobile network operators to host vast quantities of data and applications. 5G will deliver faster networks through multi-access edge computing and network slicing, which creates virtual slices within a single physical network to meet different user needs. 5G will also usher in changes to how and where data is stored and delivered, shifting the focus from centralized data centers to network edges.
"5G-Advanced Technology Evolution from a Network Perspective" white paper is officially released on Aug 5, 2021.
From the perspective of network, this document clarifies the evolution of 5G-Advanced-Technology in details.
This white paper analyzes the potential economic and competitive impact of network functions virtualization (NFV) and software-defined networking (SDN) technologies on telecommunications carriers and their networks. It finds that NFV and SDN could drive profound changes by enabling network programmability, automation, dynamic service provisioning, and the fusion of carrier networks with cloud ecosystems. While these changes present opportunities to lower costs and expand services, carriers that fail to embrace the transformation may be left with uncompetitive business models. The white paper aims to facilitate strategic discussion on how carriers can best leverage NFV and SDN.
This document summarizes key technology trends for 2019 according to an IABM analyst. It discusses drivers of change like digital warfare as more companies launch direct-to-consumer offerings. It also covers shifts in buying trends toward partnerships and cloud/software. The document tracks adoption of IP, cloud computing, and artificial intelligence and outlines opportunities and challenges for each technology.
McKinsey Global Institute Connected World-discussion-paper_february-2020DESMOND YUEN
The promise of 5G has captured the attention of business leaders, policy makers, and the media. But how much of that promise is likely to be realized anytime soon?
With the first true high-band 5G networks already live, we set out to take a realistic view of how and where connectivity could be deployed and what it can enable over the next 10 years. But 5G is not appearing in isolation. This research takes a more expansive view of connectivity to include other technologies, ranging from fiber and satellites to Wi-Fi and short-range technologies.
Despite the hype about remote surgery and Star Trek–style holodecks in everyone’s living rooms, the future is not solely happening on the frontier. Existing connectivity technologies are expanding and evolving, with new standards that boost network performance—and they are much less capital-intensive. We have identified an enormous array of use cases that can run on this type of upgraded backbone. Companies do not have to wait for high-band 5G to implement new systems and go after the resulting productivity gains.
To illustrate what is possible, this research looks at how connectivity could be deployed in mobility, healthcare, manufacturing, and retail. The use cases we identified in these four commercial domains alone could boost global GDP by $1.2 trillion to $2 trillion by 2030. This implies that the value at stake will ultimately run trillions of dollars higher across the entire global economy.
Mobile data traffic volumes are expected to increase by a factor of four by 2025, and 45 percent of that traffic will be carried by 5G networks. To deliver on customer expectations in this rapidly changing environment, communication service providers must overcome challenges in three key areas: building sufficient capacity, resolving operational inefficiencies through automation and artificial intelligence, and improving service differentiation. This issue of ETR magazine provides insights about how to tackle all three.
4G LTE over satellite is arriving to the market at a faster pace than 2G and 3G did when they emerged. 4G carries the promise of a true mobile broadband experience with high volumes, higher speeds and enhanced efficiency, blurring the lines between cellular and wifi. Mobile operators will nevertheless wonder if 4G can be even more successful than its predecessors, and what value it really brings to the subscriber. They will also want to know if there are specifi c characteristics required to run the service over satellite, and if it is possible to optimize the traffi c just like in 2G and 3G to gain bandwidth and decrease the OPEX. Lastly, can 4G deployments be future proof in light of the upcoming 5G standards?
Reduce Cost and Increase Innovation with Converged Voice and DataReadWrite
It's no question that advanced voice, data and networking communications provide the enterprise with the infrastructure for innovation.
But the recession has had its impacts. Organizations are tight on budget. They need to see that their technology investments spark innovation and coast less.
This report explores how voice and data networks can be converged to drive innovation and lower costs for the entire organization.
Ericsson Technology Review: The future of cloud computing: Highly distributed...Ericsson
The growing interest in cloud computing scenarios that incorporate both distributed computing capabilities and heterogeneous hardware presents a significant opportunity for network operators. With a vast distributed system (the telco network) already in place, the telecom industry has a significant advantage in the transition toward distributed cloud computing.
This Ericsson Technology Review article explores the future of cloud computing from the perspective of network operators, examining how they can best manage the complexity of future cloud deployments and overcome the technical challenges. Redefining cloud to expose and optimize the use of heterogeneous resources is not straightforward, but we are confident that our use cases and proof points validate our approach and will gain traction both in the telecommunications community and beyond.
5G wireless networks will support massive connectivity and capacity increases to enable new technologies and applications between 2020 and 2030. 5G will realize ultra-fast and low latency connectivity for both people and devices through advanced wireless technologies built upon existing standards like LTE as well as new radio access technologies. Key technology drivers for 5G include developments in mobile broadband speeds, spectrum and infrastructure to support applications like smart cities, industrial automation, and virtual and augmented reality.
5G will bring significantly higher data rates and lower latency compared to previous generations of wireless technology. It will enable a wide range of new applications and services by supporting connectivity for billions of devices. 5G networks will integrate both new and existing radio technologies to achieve this, including technologies like massive MIMO antennas and expanding operations into new spectrum bands. While the full 5G ecosystem is still being developed, it has the potential to disrupt many industries and business models through its dramatically improved connectivity capabilities.
Microsoft Telecommunications Industry News | April 2021Rick Lievano
I’m amazed to see our tremendous growth in the industry in this quarter. There’s plenty to be optimistic
about. With COVID vaccines readily available to more and more people worldwide in the coming months,
we will hopefully begin transitioning back to the post-COVID landscape. I know I’m not alone when I say
that I can’t wait to get back into in person customer and partner meetings. We’re forging ahead with
getting customers ready for the new normal. Proud to see TIM Brazil to move 100% of their datacenters to
the cloud.
If one thing’s for sure, organizations in the telco space have transformed rapidly in this unprecedented
year. I’m excited to share The Network, Microsoft’s newest podcast series focused on digital resilience and
acceleration of technology for the telco industry, with stories from business leaders around the globe.
Jfall 2019 - Driving the energy transition with javaCaspar Derksen
Want to know how TenneT manages the national high-voltage grid? And how we rebuilt our legacy system for balancing demand and supply of electricity in a volatile energy market? In this talk, we will show how we were able to implement a modular event-driven microservices architecture in a traditional JEE7 infrastructure environment. We will discuss the trade-offs that we made, lessons learned in realizing the system, and how we will further evolve to our cloud platform. In addition, we will give an insight into our agile transformation journey, and how this was essential to the success of the project.
The document describes Sushant Mittal's 6 month internship project at Connectem Software Systems Private Limited where he automated LTE call flows and developed a Policy and Charging Rules Function (PCRF) simulator. The project involved using Robot Framework to automate common LTE procedures like attach, detach, handover. It also included developing a wrapper in Python to run an existing PCRF simulator called Seagull.
Including VoIP over WLAN in a Seamless Next-Generation ...Videoguy
This document discusses including voice over IP (VoIP) capabilities over wireless local area networks (WLANs) in a seamless next-generation wireless environment. It addresses key issues for deploying VoIP over WLANs such as quality of service, call control, network capacity, and architecture. It also analyzes WLAN network capacity for supporting VoIP, including considerations for over-subscription of voice services, throughput requirements for voice and media applications, and capacity planning for enterprise and home WLAN deployments. The goal is to provide an overview of critical issues for implementing VoIP over WLAN applications.
The document discusses 5G mobile technology and its evolution from earlier generations. It provides details on:
1) How 5G will offer unprecedented call volume and data transmission speeds compared to previous technologies.
2) The network architecture of 5G, which will integrate different wireless technologies like PANs, WANs and cellular networks to provide seamless global connectivity using IPv6 addressing.
3) The mix-bandwidth data path design for 5G, which efficiently utilizes the resources of multiple overlapping wireless networks like pico-cells, micro-cells and macro-cells that cover the same area.
Technology, Media And Telecommunications Prediction 0f 2020aakash malhotra
According to the experts from deloitte india, media, telecommunications and technology industries are going to flourish like never before. See More : https://www2.deloitte.com/in/en/pages/technology-media-and-telecommunications/articles/tmt-predictions-2020.html
This document discusses the direction of 5G evolution and 6G mobile communication technologies. It outlines considerations for 5G evolution, including improving millimeter wave coverage and uplink performance for industrial use cases. It then discusses expectations for 6G technologies in the 2030s, such as solving social problems, advanced cyber-physical fusion, and the need for ubiquitous high-speed connectivity everywhere. Key requirements for 6G are identified, such as extreme high data rates over 100Gbps, low latency, massive connectivity, and coverage in all environments including sky, sea and space. Use cases like high-fidelity sensory services and real-time data transmission for industry and AI are presented.
Performance Analysis and Optimization of Next Generation Wireless NetworksUniversity of Piraeus
The Fifth Generation (5G) networks, including the 5G Vehicular Cloud Computing (5G-VCC) systems, have evolved rapidly offering multiple services to users. The operating principles of vehicular networks, Cloud Computing (CC), Fog Computing (FC), Mobile Edge Computing (MEC) and Software Defined Networks (SDN) are applied to 5G infrastructures. In a 5G-VCC system, the vehicles are equipped with On-Board Units (OBUs) which communicate with each other as well as with Road Side Units (RSUs). Each RSU interacts with a Cloud infrastructure which offers vehicular services with strict Quality of Service (QoS) requirements, including Driver Assistance (DA), Passengers Entertainment and Information (PEnI) and Medical (MED) services. Dense deployments of 5G access networks are also implemented, called Ultra Dense Networks (UDNs), aiming to support high data rates produced by an increased number of vehicular users. In this environment, heterogeneous technologies are used to transfer the network services to vehicles. Optimal manipulation of the communication resources is required, while at the same time vehicular users should always obtain connectivity to the most appropriate network access technology, in order the constraints of the vehicular services to be satisfied. In this thesis, existing schemes for resource allocation as well as for mobility management are studied, while novel solutions are proposed for each topic.
This document discusses the deployment of Long-Term Evolution (LTE) networks and the importance of in-building solutions to handle increasing mobile data traffic indoors. It notes that LTE will see its first deployments this year and will reinforce the "islands of life" concept by providing continuity of voice and data services in locations like workplaces, homes, malls and train stations. Providing quality in-building coverage presents challenges around architecture, design, installation, optimization and operations that require well-considered solutions. The document outlines best practices for selecting the right in-building LTE solution.
The document provides a summary of key announcements and trends from the 2014 Mobile World Congress conference around networks, devices, and services. Some of the main points discussed include the growing focus on network virtualization and small cell deployments to improve networks, efforts to lower smartphone prices including the possibility of a $25 smartphone, and increasing emphasis on digital services and connectivity of devices and things beyond mobile phones.
The semiconductor industry is constantly confronted by design and device-integration challenges, since IoT applications and consumers demand small, portable, and multi-functional electronics. With hardware designing constantly evolving, a new class of designers is stepping up to take on these challenges, using various silicon implementations. The advantages of system-on-a-chip (SoC) over other silicon implementations make it the most suitable solution for intelligent edge computing in IoT applications.
The rise of IoT products and platforms has led to a number of challenges that need to be addressed to explore the full potential of IoT systems and their related emerging applications. This report includes a comprehensive analysis of the SoC-IoT space, highlighting the major trends and opportunities across the ecosystem.
To purchase the full report, write to us at info@netscribes.com
Visit www.netscribes.com
5G will radically change digital services and security by enabling decentralized, intelligent networks that can react to individual user needs. It will allow mobile network operators to host vast quantities of data and applications. 5G will deliver faster networks through multi-access edge computing and network slicing, which creates virtual slices within a single physical network to meet different user needs. 5G will also usher in changes to how and where data is stored and delivered, shifting the focus from centralized data centers to network edges.
"5G-Advanced Technology Evolution from a Network Perspective" white paper is officially released on Aug 5, 2021.
From the perspective of network, this document clarifies the evolution of 5G-Advanced-Technology in details.
This white paper analyzes the potential economic and competitive impact of network functions virtualization (NFV) and software-defined networking (SDN) technologies on telecommunications carriers and their networks. It finds that NFV and SDN could drive profound changes by enabling network programmability, automation, dynamic service provisioning, and the fusion of carrier networks with cloud ecosystems. While these changes present opportunities to lower costs and expand services, carriers that fail to embrace the transformation may be left with uncompetitive business models. The white paper aims to facilitate strategic discussion on how carriers can best leverage NFV and SDN.
This document discusses 5G as a service (5GaaS) and how 5G infrastructure could be built utilizing public cloud providers to reduce latency for applications. It argues that with tightening budgets, the "as a service" model allows organizations to consolidate resources and control costs while adapting services seamlessly. The document outlines the benefits of using public cloud providers for 5G core and edge infrastructure due to their ability to handle increasing complexity and rapidly growing demand as more applications and devices connect to 5G networks.
This document summarizes an e-book from a blog that provides strategic insights for telecommunications companies. It discusses the utility of software-defined networking (SDN) for telcos, how telcos can organize to offer new services and pursue growth, and the growth of SDN and network function virtualization in the telecommunications industry. The document outlines the business case and technical capabilities of SDN, as well as case studies of companies adopting SDN and market projections for SDN adoption and revenue. It also discusses how telcos can transform their business models and organizations, like IBM did, to focus more on new services.
Microsoft Telecommunications Newsletter | September 2021Rick Lievano
Monetizing the edge continues to be a top priority for telcos, and not a day goes by where we don’t have a meaningful conversation on the topic with a telco partner. While the edge’s killer app continues to elude the industry, private mobile networks and video analytics are quickly becoming the critical building blocks for bringing it to market – whatever it is.
So where can you learn more about monetizing the edge? The TM Forum Digital Transformation World Series 2021 provides a collaborative environment for operators and suppliers to come together, share ideas, and solve the industry’s toughest problems. Microsoft is an active participant in this year’s event, sharing best practices, successes, and industry insights across wide-ranging areas including edge, artificial intelligence, cloud transformation, and customer experience.
See the Events section for details on how Microsoft is participating at this year’s show. We look forward to seeing you virtually at the event!
The document discusses how service providers can transform their businesses by combining 5G, cloud computing, and artificial intelligence (AI). It outlines five key shifts needed for this transformation: 1) Moving from physical to virtualized and cloud-native infrastructure, 2) Transitioning from centralized to distributed architectures, 3) Changing from static to dynamic capacity that scales with demand, 4) Automating operations that were previously manual, and 5) Integrating security across the network rather than using isolated security solutions. The document argues that combining these technologies will allow service providers to launch new services, improve operational efficiency, differentiate customer experiences, and compete more effectively.
Microsoft Telecommunications Industry Newsletter | September 2019Rick Lievano
The Microsoft Worldwide Telecommunications Industry team is pleased to share with you the September 2019 Telecommunications Industry Newsletter, available to both internal and external audiences. We encourage you to share it with your colleagues and distribute it to your customers and partners as appropriate. As always, we welcome your input, feedback, and suggestions!
Every 25 years or so, telecom networks get totally re-designed. The last big re-build came with the internet in the early 1990s. Now “IP networking” technology is giving way to another technology cycle known as “software defined networking”. SDN is a new architecture for telecom networks in which the emphasis shifts from hardware to software. It will be hugely disruptive because it fundamentally changes who controls the telecom network. In the report we predict some of the winners and losers.
This document discusses trends in cloud computing and Israel's cloud computing industry. It defines cloud computing and its three main types: infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). While still evolving, cloud computing has become a major trend, driven by cost savings. The document outlines security, diversifying SaaS applications, and hybrid cloud models as important trends. It also provides an overview of Israel's cloud computing industry and major companies in areas like security and SaaS.
There has been no shortage of edge computing activities during 2017, in both the telco and web-scale
domains. Several Tier One communication service providers (CSPs), including AT&T, China Mobile, and
Deutsche Telecom (DT), have announced that edge computing will be a key component of their future
network strategies and expect that several new use cases will be powered by edge servers. In the cloud
domain, Amazon, Facebook, and Google are pushing further toward the edge of their own networks, creating
more points of presence throughout the world. Amazon’s acquisition of Whole Foods in the United States
could also be interpreted as a first attempt to obtain real estate across the U.S. market that can be used
for Amazon’s edge servers. In fact, all major web-scale companies—Amazon, Google, and Microsoft—have
announced edge computing services that are driven by IoT use cases.
This document discusses the rollout of 5G networks in India. It notes that while edge computing discussions have risen globally in recent years, Asia Pacific and India are leading regions for edge computing adaptation. The document also discusses how the Ladakh institute has become the first in India's union territories to implement a LiFi network for internet access. It covers how 5G will enable new applications and industries in India through high data rates and low latency connectivity. However, it notes that the COVID-19 pandemic delayed the launch of 5G in India and that a 2021 parliamentary report found insufficient work had been done yet to launch 5G. It believes 5G rollout across India will take 2-3 more years while 4G networks remain important.
The document discusses du's digital transformation journey towards becoming a software-defined network provider. It outlines du's plans to invest in next-generation technologies like 5G, IoT, AI and blockchain over the next five years to power new solutions and services for customers. Du recognizes that to keep up with rapidly changing technology and customer expectations, it needs to undergo an organizational digital transformation to operate with more agility. The whitepaper discusses the drivers of change pushing du's transformation, how it is aligning its infrastructure and capabilities with different customer groups, and the tools and changes needed across its organization, infrastructure, processes and workforce to complete its transition.
Microsoft Telecommunications Industry Newsletter | December 2019Rick Lievano
The Microsoft Worldwide Telecommunications Industry team is pleased to share with you the December 2019 Telecommunications Industry Newsletter, available to both internal and external audiences. We encourage you to share it with your colleagues and distribute it to your customers and partners as appropriate. As always, we welcome your input, feedback, and suggestions!
Edge computing is redefining the cloud computing space. The growing de-emphasis on the cloud’s role in connected environments is expected to lead to smarter and faster autonomous solutions that have the potential to reshape the IoT landscape. Edge computing will transform the IoT landscape into a hyperconnected environment where the restrictions related to latency and computation capacity will be eliminated. Many companies are transforming their business models to attain edge computing capabilities necessary for offering end to end services.
The recent years have witnessed a number of mergers and acquisitions in the edge computing space for IoT services, with the increase in M&A activities representing the industry’s conundrum of cloud, edge, and hybrid architectures, and the race to achieve a considerable market share.
This report includes an analysis of approximately 60 deals, along with a detailed technology overview and the purpose of the acquisitions. The M&A analysis section offers a comprehensive view of the transactions around edge computing, covering different technology aspects including data center, AI, security, software-defined WAN (SD-WAN), analytics, interoperability, multi-access edge computing (MEC), and others.
To purchase the full report, write to us at info@netscribes.com
Microsoft Telecommunications Industry News | October 2020Rick Lievano
The Microsoft Worldwide Telecommunications Industry team is pleased to share with you the October 2020 Telecommunications Industry Newsletter, available to both internal and external audiences. We encourage you to share it with your colleagues and distribute it to your customers and partners as appropriate. As always, we welcome your input, feedback, and suggestions!
rom the widespread adoption of 5G and the integration of AI and Machine Learning to the imperative of robust cybersecurity measures and the exciting convergence with healthcare, the industry is gearing up for transformative shifts that promise to redefine how we live, work, and communicate. While the path ahead is fraught with challenges, it's also ripe with opportunities for innovation, growth, and enhanced connectivity.
The Future of Cloud Computing Latest Trends and Innovations.pptxMicrosoft azure
In this article, we'll look at some of the developing trends and developments that are predicted to shape the future of Cloud Computing Training in Noida
The Future of Cloud Computing Latest Trends and Innovations.pptxMicrosoft azure
Edge computing is expected to become prominent in the future of cloud computing as it allows for processing and analyzing data at the network edge, improving efficiency and user experiences. Serverless computing is gaining popularity as it allows developers to focus solely on writing code without managing infrastructure. Quantum computing promises exponentially more processing power and cloud providers are looking to make these services more accessible. Multi-cloud and hybrid cloud approaches will also define the future as they help avoid vendor lock-in, improve redundancy, and optimize costs while providing flexibility. Artificial intelligence and machine learning will also play a significant role by allowing businesses to gain insights from data through cloud-based services. Security and privacy measures will also improve with new features like confidential computing and zero-trust architectures
Belden Total Enterprise Network White Paperadventive1
The document discusses the future of converged networks in enterprises, where different building systems like networking, AV, security, and building management will transmit signals over a common IP infrastructure. It outlines the key drivers for convergence like increased data and bandwidth demands, mobility needs, safety/security concerns, environmental initiatives, and reducing costs. Enterprises face challenges in deploying converged networks as they start down this path over the next decade. The networks of the future will require performance across various cabling systems and seamless integration of different building operating systems.
This document summarizes key aspects of practical LTE network design and deployment. It describes the end-to-end LTE network architecture including the evolved NodeB (eNB), Evolved Packet Core (EPC), and interfaces. It then analyzes LTE coverage and link budgets for different deployment scenarios. Dimensioning and design considerations are discussed including throughput, capacity, and quality of service (QoS). Latency is analyzed and compared to HSPA+. The document provides guidance on commercial LTE network planning and implementation.
This document analyzes the performance of Voice over LTE (VoLTE) based on field measurement data from commercial LTE networks. It evaluates VoLTE performance in terms of real-time transport protocol (RTP) error rate, jitter and delays, block error rate (BLER), and voice quality measured by mean opinion score (MOS). It also analyzes key VoLTE features like robust header compression (ROHC) and transmission time interval (TTI) bundling. Guidelines are provided for optimizing VoLTE deployment based on practical field testing results.
Sample-by-sample and block-adaptive robust constant modulus-based algorithmsDr. Ayman Elnashar, PhD
In this study, a robust sample-by-sample linearly constrained constant modulus algorithm (LCCMA) and a robust adaptive block-Shanno constant modulus algorithm (BSCMA) are developed. The well-established quadratic inequality constraint approach is exploited to add robustness to the developed algorithms. The LCCMA algorithm is implemented using a fast steepest descent adaptive algorithm, whereas the BSCMA algorithm is realised using a modified Newton’s algorithm without the inverse of Hessian matrix estimation. The developed algorithms are exercised to cancel the multiple access interference in a loaded direct sequence code division multiple access (DS/CDMA) system. Simulations are presented in a rich multipath environment with a severe near-far effect to evaluate the robustness of the proposed DS/CDMA detectors. Finally, a comprehensive comparative analysis between the sample-by-sample and block-adaptive constant modulus-based detectors is presented. It has been demonstrated that the developed robust BSCMA detector offers rapid convergence speed and very low computational complexity, whereas the developed robust LCCMA detector engenders about 5 dB improvement in the output signal-to-interference-plus-noise ratio over the BSCMA detector.
A novel low computational complexity robust adaptive blind multiuser detector, based on the minimum output energy (MOE) detector with multiple constraints and a quadratic inequality (QI) constraint is developed in this paper. Quadratic constraint has been a widespread approach to improve robustness against mismatch errors, uncertainties in estimating the data covariance matrix, and random perturbations in detector parameters. A diagonal loading technique is compulsory to achieve the quadratic constraint where the diagonal loading level is adjusted to satisfy the constrained value. Integrating the quadratic constraint into recursive algorithms seems to be a moot point since there is no closed-form solution for the diagonal loading term. In this paper, the MOE detector of DS/CDMA system is implemented using a fast recursive steepest descent adaptive algorithm anchored in the generalized sidelobe canceller (GSC) structure with multiple constraints and a QI constraint on the adaptive portion of the GSC structure. The Lagrange multiplier method is exploited to solve the QI constraint. An optimal variable loading technique, which is capable of providing robustness against uncertainties and mismatch errors with low computational complexity is adopted. Simulations for several mismatch and random perturbations scenarios are conducted in a rich multipath environment with near–far effect to explore the robustness of the proposed detector.
This document summarizes research on using artificial neural networks (ANNs) to automatically analyze and classify surface electromyography (SEMG) signals. The researchers:
1) Collected SEMG data from normal subjects and those with myopathies during muscle contractions. They extracted features using autoregressive (AR) modeling of signal segments.
2) Compared the classification performance of ANNs (backpropagation, self-organizing feature map, probabilistic neural network) to Fisher's linear discriminant analysis. The ANNs achieved over 90% correct classification while the linear method was poorer.
3) Concluded that properly processed SEMG combined with ANN classification can provide an automated diagnostic assist tool for physicians to help
Du's mobile broadband network was ranked the best in Africa and the Middle East based on download speed, upload speed, latency, and coverage. Du is moving to deploy LTE to help address increasing data traffic and smartphone usage. Test results showed that LTE using 1800MHz spectrum and 20MHz of bandwidth achieved average downlink speeds of 33Mbps, compared to 12.3Mbps for DC-HSPA+ using 2.1GHz spectrum. LTE also had better spectrum efficiency, higher usage of advanced modulations like 64QAM, improved coverage radius, lower latency, and is expected to provide higher capacity than DC-HSPA+.
Wideband-AMR validation and testing was conducted over 3G networks. Wideband audio from 50-7000 Hz provides improved speech quality, naturalness, and intelligibility compared to narrowband audio from 200-3400 Hz. The test involved comparing wideband and narrowband audio streams for various audio clips and analyzing frequency responses. Results showed wideband captured higher frequencies and had better adaptive noise cancellation and audio quality. Testing also validated seamless switching between wideband and narrowband during 3G to 2G handovers.
This document discusses driving broadband innovation in the UAE using du's LTE evolution. It begins with an overview of du's broadband portfolio including mobile and fixed network services. It then discusses why LTE is important for speed enhancement, latency reduction, quality of service capabilities, and a simple flat architecture. The document outlines LTE evolution and spectrum options, and discusses du's deployment strategy and trial results showing improved speeds and latency compared to earlier technologies like HSPA+.
The document summarizes research on robust multiuser detection techniques for direct-sequence code-division multiple access (DS-CDMA) systems. It introduces numerically robust algorithms like the inverse QR decomposition RLS algorithm to overcome issues with conventional RLS algorithms in ill-conditioned environments. It also discusses the minimum output energy detector and its implementation using the IQRD-RLS algorithm. Finally, it outlines various channel estimation techniques used for multiuser detection like the max/min, improved cost, modified cost, Capon, and power methods.
The document discusses broadband evolution and spectrum challenges. It provides an overview of du's broadband portfolio including fixed wireless broadband, HSPA+, and LTE technologies. Key points include du being the first in the UAE to deploy DC-HSPA+ nationwide. The document also discusses evolutions in fixed wireless broadband using OFDM technology, enhancements to HSPA+ through MIMO and dual carrier implementations, and du's LTE deployment strategy focusing on improved peak rates, coverage, and average throughput compared to HSPA.
1) The document discusses the evolution of mobile broadband technologies including HSPA, HSPA+, and LTE.
2) Key enhancements included increased peak data rates through techniques like multi-carrier, MIMO, and wider channel bandwidths of up to 20MHz.
3) Each release aimed to approximately double throughput capabilities from the previous release through these combinations of technologies, with goals of 100Mbps+ downlink speeds for LTE beyond Release 9.
The document discusses du's broadband portfolio in the UAE, with a case study on implementing WiFi on the Dubai Metro. It outlines du's use of HSPA, WiMAX, and WiFi technologies for mobile and fixed broadband services. Specifically, du used WiMAX to provide the backhaul network for Metro WiFi access on trains and in stations. While HSPA has a smaller cell radius that shrinks with loading, WiMAX provides consistent coverage and can support more users at the cell edge achieving 512kbps throughput. Overall, WiMAX networks have higher capacity and lower latency than comparable HSPA networks.
1) The document discusses robust adaptive beamforming techniques to improve robustness against uncertainties in array manifold, such as direction-of-arrival mismatch.
2) It proposes an alternative realization of robust linearly constrained minimum variance beamforming that uses an ellipsoidal uncertainty constraint on the steering vector.
3) A key contribution is integrating diagonal loading techniques by deriving an optimum variable loading level, providing "loading-on-demand" instead of fixed loading. This allows accurate computation of the diagonal loading level based on the uncertainty constraint.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
1. www.du.ae 1
Defining Telco Cloud @
EITC
Whitepaper | April 2019
www.du.ae
Implementation of cloud-based future network
architecture: Key strategy pillars and execution focus
points
2. Defining Telco Cloud @ EITC
www.du.ae 2
Saleem AlBlooshi
Emirates Integrated
Telecommunications Company
PJSC
Chief Technology Officer
“The future for telcos is in offering differentiated ICT
products and services which are a far cry from purely
offering connectivity solutions of the past. The
cloudification of our network with the support of our
partners such as Nokia offers the promise of an agile,
optimised and future-ready network that will open new ICT
and use cases based on IoT and 5G business streams that
are more in tune with meeting customer demands in the
future.”
3. Defining Telco Cloud @ EITC
www.du.ae 3
Ed Aji,
CTO MEA,
Nokia
“We are excited to partner with du in its network
cloudification journey by building Telco cloud
infrastructure (NFVI) to host IMS VNFs. Evolutionary
nature of the cloudification requires good & early
understanding of strategic objectives e.g. agility and
flexibility in the network, and operational aspects of Telco
cloud, where we look forward to support du.
Connectivity, coupled with reliability and security, is key to
building new successful digital business models. Meeting
the demands for reduced time-to-market and agility in
operations needs a future-proof network technology and
architecture. Telco cloud, based on NFV and SDN
technology, provides such foundational capability in which
telcos will be able to build and offer personalized and
contextualized services.”
4. Defining Telco Cloud @ EITC
www.du.ae 4
CONTENTS
EXECUTIVE SUMMARY 6
EITC’S FUTURE TECHNOLOGY ARCHITECTURE: NFV AND SDN 7
5G opens new possibilities 7
IoT enables new Connectivity for Industry verticals 8
Multi-access Edge computing as catalyst for new real-time use cases 10
Building next-generation Data Centres with NFVI and SDN 11
Faster time to market through Cloud agility 14
Technology roadmap evolution towards cloud-native 15
REORIENTING FOR FUTURE MODE OF OPERATIONS 18
Cloud operational requirements 18
Path towards closed loop Automation 20
Network slicing and lifecycle management 22
DevOps for agile Telecom services delivery 24
Analytics and AI/ML in the future network 27
SECURITY FRAMEWORK FOR A FUTURISTIC NETWORK 29
Cloud brings new aspects to Security management 29
Evolution of NFV and Security strategy 29
Security across NFV layers 31
IaaS impacts end-to-end Cloud infrastructure 32
SDN is in the heart of Cloud Security 32
Design for secure NFVI 34
Cloud and multi-tenancy 35
CONCLUSION 36
ACRONYMS 37
WORKS CITED 38
5. Defining Telco Cloud @ EITC
www.du.ae 5
EXHIBITS
FIGURE 1. SEVEN DIFFERENT STREAMS TOWARDS 5G NETWORK ...............................7
FIGURE 2. EARLY MARKET USE CASES FOR 5G ................................................................8
FIGURE 3. 4TH INDUSTRIAL REVOLUTION POWERED BY 5G AND AI ...........................9
FIGURE 4. EDGE USE CASES FOR ENTERPRISE AND INDUSTRY VERTICALS.............10
FIGURE 5. CAPABILITIES OF NEXT GENERATION DATA CENTRES..............................11
FIGURE 6. TELCO CLOUD BUILDING BLOCKS .................................................................12
FIGURE 7. KEY DRIVERS FOR TELCO CLOUD ADOPTION..............................................13
FIGURE 8. KEY PRINCIPLES FOR CLOUD-NATIVE ARCHITECTURE .............................14
FIGURE 9. CLOUDIFICATION JOURNEY TOWARDS CLOUD-NATIVE AND BEYOND .15
FIGURE 10. BUILDING BLOCKS FOR CLOUD-NATIVE CORE..........................................16
FIGURE 11. BUILDING BLOCKS OF PROGRAMMABLE 5G CORE NETWORK ...............16
FIGURE 12. COMPLEXITY GROWTH CALLS FOR OPERATIONS AUTOMATION ..........18
FIGURE 13. COGNITIVE IS THE ULTIMATE STEP IN THE EVOLUTION OF
OPERATIONS ................................................................................................................19
FIGURE 14. OPERATIONS DRIVEN BY AUTOMATION AND ANALYTICS .....................20
FIGURE 15. ASSURANCE, FULFILLMENT, ASSURANCE AND CAPACITY
MANAGEMENT AUTOMATED IN THE CLOSED LOOP............................................21
FIGURE 16. CLOSED LOOP AUTOMATION CAN BE REALIZED ON MANY LEVELS OF
NFV STACK...................................................................................................................21
FIGURE 17. INFRASTRUCTURE (SLICE) AS A SERVICE TYPES OF OFFERS..................22
FIGURE 18. PHASES OF NETWORK SLICE INSTANCE MANAGEMENT. SOURCE: 3GPP
TR 28.801........................................................................................................................23
FIGURE 19. END-TO-END NETWORK SLICING MANAGEMENT .....................................23
FIGURE 20. DEVOPS PIPELINE: HIGH LEVEL STAGES.....................................................24
FIGURE 21. MICROSERVICE ARCHITECTURE AND DEVOPS..........................................25
FIGURE 22. MULTIVENDOR ENVIRONMENT IN THE DEVOPS METHODOLOGY.........26
FIGURE 23. APPLYING AI FOR DIGITAL INTELLIGENCE CLOSED LOOP......................27
FIGURE 24. KEY TELECOM DOMAINS ADDRESSABLE BY AI/ML .................................27
FIGURE 25. IAAS BOUNDARIES IN ETSI NFV REFERENCE ARCHITECTURE.................29
FIGURE 26. TYPICAL NFV EVOLUTION STAGES..............................................................30
FIGURE 27. IAAS IMPACT ON END-TO-END CLOUD INFRASTRUCTURE......................32
FIGURE 28. SECURING THE SDN.........................................................................................33
FIGURE 29. EXAMPLE OF SECURITY ZONES ....................................................................34
FIGURE 30. TRAFFIC SEPARATION EXAMPLE..................................................................34
FIGURE 31. EXAMPLE OF SECURITY ZONES WITH PHYSICAL FIREWALLS
CONTROLLING INTER-ZONE TRAFFIC.....................................................................35
6. Defining Telco Cloud @ EITC
www.du.ae 6
EXECUTIVE SUMMARY
Today’s telecommunication market presents
several opportunities for communication
service providers to bolster current revenue
sources or to create entirely new revenue
streams. Many of those opportunities will
arise from changing market conditions,
consumer preferences and from the rollouts
of 5G, IOT and ICT technologies, which are
expected to create significant business
opportunities. At the same time, industry is
witnessing tremendous efforts in various
enterprise and industry verticals to re-build
their business models. Connectivity, coupled
with reliability and security, is key to
building successful digital business models.
Since different industry verticals and
enterprises have different needs and use
cases, connectivity needs to move from a
“one size fits all” to a “network that is able
to meet the often specialized and stringent
requirements”. Cloud-based 5G networks
will offer capabilities to meet such widely
varied requirements.
This white paper highlights the need for
Cloud-based future network architecture,
new 5G and IOT technology trends, changes
EITC has to consider to adopt the new
architecture and ways to address new
Security threats through holistic Security
management. This white paper does not
outline the detailed practical implementation
aspects of the future network architecture or
the transformation journey.
5G is being designed to enhance existing
mobile broadband services, but more
importantly, it will open new capabilities and
network efficiencies not possible with
today’s networks. There are endless
possibilities with 5G, but to turn them into
real business cases there is a need for a
future-proofed network architecture. Telco
Cloud based on Network Function
Virtualization (NFV) and Software Defined
Networking (SDN) is the key enabling
technology for future network architecture.
We need to build a cloud-native environment
designed to optimize capacity, coverage,
energy consumption and overall operational
costs. Adoption of NFV and SDN
technology helps to automatically adapt to
changing requirements, efficiently scale,
constantly self-optimize, and make use of
innovation from the wider ecosystem.
Currently EITC is in the midst of such
technology and architecture transition.
EITC acknowledges the need for re-
organization and re-orientation of existing
operational processes, people competence
and services capabilities, all required to
maximize benefits promised by new
technology. It is also critical to realize that
Cloud brings new challenges to Security
management of the network. Hence, there is
a need for careful analysis of new boundaries
introduced by NFV and SDN architecture,
and of potential threats that could arise.
The following sections briefly describe the
NFV and SDN architecture, required re-
orientation for Future Mode of Operations
and holistic Security framework aspects.
7. www.du.ae 7
EITC’S FUTURE TECHNOLOGY
ARCHITECTURE: NFV AND SDN
5G OPENS NEW POSSIBILITIES
As Communication Service Providers
(CSPs) move towards a global, mobile
digital economy, all verticals are seeing the
emergence of new business and delivery
models and consumption patterns that
disrupt the status quo. For instance, while
people are taking more photos than ever
before and posting them on social network
sites, traditional photography pioneers have
floundered. Internet content provider
companies dominated content distribution
market and evolved their business models
from simply a distribution company to a
content producer and over-the-top player. As
the demand for new innovative solutions and
services are on rise from our customers,
EITC is embarking on a journey to bring the
future technologies like 5G, Internet of
Things (IoT), Artificial Intelligence and
Machine Learning (AI/ML) to the market.
5G is being designed to simultaneously
deliver multiple use cases to individual
consumers, enterprises and has the potential
to support a completely connected world
across different industry verticals. 5G will
enable the delivery and management of
interactive, intelligent, energy efficient, and
smart applications to any connected device
in any industry sector, in near-real time. The
capacity, latency, agility, reliability and
speeds offered by 5G technology make it
Figure 1. Seven different streams towards 5G network
8. Defining Telco Cloud @ EITC
www.du.ae 8
relevant for not only consumers but also for
enterprises and industry verticals.
Early 5G use cases are seen located in
Enhanced Mobile Broadband, have a local
character, serve a clearly defined need, and
reach the break-even point relatively
quickly. The first applications need to be
able to work in ‘islands’ e.g.:
- Home experience using 5G as fixed
wireless technology
- Event experience with the help of
advanced Augmented Reality and High
Definition (HD) video services
- Industry Experience with a clear added
value as the first-time wireless
technology providing the most extreme
reliability requirements in the factory of
the future
- Islands of coverage within public
transport, e.g. within a ship or a train for
in-vehicle infotainment.
Preparation for 5G begins with the setting of
business goals and even new business
models, not only technology considerations.
5G is a new architecture which includes
Edge Cloud, Cloud Radio Access Network
(RAN), Core having cloud-native
capabilities to efficiently scale according to
the demand, transport having the ability to
deliver high speeds at ultra-low latency, and
network slicing capabilities supported by all
elements. Previously unviable activities are
made possible with 5G architecture e.g.
EITC will be able to offer significant
improvements to the reliability, Quality of
Service (QoS) and Quality of Experience
(QoE) for new and existing customers on a
per service basis.
IOT ENABLES NEW
CONNECTIVITY FOR
INDUSTRY VERTICALS
IoT and digital connectivity services are still
nascent. 5G technology is expected to help,
develop and monetize IoT propositions.
While it may seem that everything is
connected today, this is just the tip of the
iceberg. Today’s connected devices are
Figure 2. Early market use cases for 5G
9. Defining Telco Cloud @ EITC
www.du.ae 9
predominantly smartphones, tablets, PCs and
TV. In the future, internet connectivity will
be more pervasive than power connectivity
in some regions of the globe (i.e.
smartphones and tablets could be charged
using solar power) and there will be billions
of sensors globally. Practically anything that
contains a microchip, or a sensor could be
connected to a communications network to
provide information on its usage and its
surroundings. By using big, fast data and
analytics tools, the sensors can relay
information to other parts of the network,
decision supporting tools or partners in the
ecosystem to propose options and actions to
improve Quality of Experience (QoE) and/or
monetize data. In the future world,
technology will play a critical role in all
industries. IoT services in particular, are seen
as a way of efficiently connecting and
monitoring the supply chain and creating
new value chains. Many IoT services are
already possible today within verticals, for
example in logistics, but are yet to realize
their full potential. There is an opportunity
for EITC to play a role in expanding the
levels of connectivity and interdependencies
between industry verticals, and to monetize
these relationships. EITC can offer fast,
reliable, high capacity, agile network
connectivity and analytics to help different
consumers and industry verticals with
bringing their concepts and use cases to
market. The introduction of 5G standards can
make this a reality.
Initially, it is IoT signalling rather than IoT
applications that will increase pressure on
cellular networks’ capacity. As we approach
the 2020 timeframe, there will be significant
growth in upstream IoT video streaming for
Security applications transferring content to
Cloud-based video analytics platforms and
the number of cellular IoT connection,
especially from wearables, will continue to
push up daily traffic.
On top of connectivity, short and medium
term IoT opportunities are seen in
surveillance/ Security monitoring (factories,
ports) and smart building/facility
management.
Figure 3. 4th Industrial Revolution powered by 5G and AI
10. Defining Telco Cloud @ EITC
www.du.ae 10
MULTI-ACCESS EDGE
COMPUTING AS CATALYST
FOR NEW REAL-TIME USE
CASES
Multi-access Edge Computing (MEC), also
known as Edge computing, is a key enabler
of 5G networks and will help to address a
much wider range of use cases and business
opportunities than ever before. Edge
computing will provide ultra-responsive,
high bandwidth, locally-relevant and highly
personalized services to end users.
For example, in a sports stadium, augmented
reality or virtual reality services showing the
action on the pitch in new ways and high-
resolution video replays could be offered to
spectators, differentiating the customer
experience and generating new revenue
opportunities for EITC. Edge computing will
also be a vital technology to support
demanding Internet of Things applications in
industrial verticals and across smart cities.
Edge Computing is widely seen as a
powerful technology that can improve the
mobile communications experience, cost-
effectively support demanding IoT
applications, and provide new ways to
maintain network performance and enrich
the customer experience. The customer
experience is greatly improved by ability to
deliver real-time mobile services that use
context information and location awareness
to create a high degree of personalization.
These services can also be more responsive
because of the ultra-low latency achieved by
locating computing resources near the point
of use. Popular and locally-relevant content
can be delivered from exactly where users
consume it.
Real-time network and context information
together with real-time analytics can
proactively optimize network and service
operation, thus helping to maintain the
customer experience. Edge computing is
already being deployed on today’s 4G
networks to deliver new services to multiple
sectors and create innovative business
opportunities. It opens opportunities for
collaboration and is proving to be a
powerful catalyst for innovation.
Edge computing is a key enabler and
architectural concept for 5G, helping to
satisfy 5G throughput, latency, scalability
Figure 4. Edge use cases for Enterprise and Industry verticals
11. Defining Telco Cloud @ EITC
www.du.ae 11
and Automation targets. It offers additional
privacy and security and ensures significant
cost efficiency.
Edge computing applications are best
deployed close to the small cells, macro cells
or Wi-Fi access points near to or within a
venue or site. Small-scale distributed MEC
provides locally-relevant services to
enterprises and venues. For example:
- A sports stadium could use MEC to
provide high quality video clips
from the event to spectators
- An airport could use MEC for
advertising, location and virtual
reality
- An industrial plant could use MEC
for video surveillance and as an IoT
gateway for connecting IoT devices
- A campus or conference centre
could offer local services to
residents and visitors
BUILDING THE NEXT
GENERATION DATA
CENTRES WITH NFVI AND
SDN
Data Centres have traditionally been used in
the IT industry to provide software services,
on-demand Cloud computing and storage
capabilities. The Telecom industry is
evolving to NFV and SDN architecture,
including 5G, in which Data Centres and
Cloud software will provide the
infrastructure for Telecom networks.
Virtualized network elements and functions
will run on commodity server architectures
in a Telco capable Data Centre, supported by
very large amounts of storage capacity with
high bandwidth connectivity. These Data
Centres themselves will vary in size and
geography e.g. centralized core and IT Data
Centres, distributed Edge Data Centres,
depending on the needs of the functions they
support.
Figure 5. Capabilities of Next Generation Data Centres
12. Defining Telco Cloud @ EITC
www.du.ae 12
By adopting NFV and SDN technologies,
Data Centre is rapidly becoming the
dominant infrastructure solution for
computing and networking. Future Data
Centres are being designed to host all kinds
of Applications e.g. Telco-specific,
Enterprise-specific, content streaming, e-
commerce, data storage, AI applications and
alike. 5G network elements will run in
virtualized mode on Telco Cloud platforms
e.g. Cloud RAN, Edge, Enhanced Packet
Core and Converged Core. In coming years,
EITC foresees significant growth to the Data
Centre infrastructure, mainly due to
increasing traffic growth in the network. To
prepare for this growth, EITC is taking steps
towards having next-generation Data
Centres with common, shared infrastructure.
Recent market trends show that
Communication Service Providers (CSPs)
are starting the journey with having separate
optimized infrastructure to run different
types of workloads e.g. IT, Telco Cloud and
Enterprise. CSPs take steps to standardize
particular infrastructure, Management and
Orchestration solutions, and deploy them to
different clusters to support different kinds
of workloads. Most of the CSPs also define
a roadmap towards a hybrid Cloud with
common converged infrastructure. The
evolution to support both Telecom
applications in Data Centres along with IT
requires that we take a closer look at what
attributes and capabilities are required to run
this new class of Telecom applications in the
Data Centre.
EITC is currently focusing on key
technology attributes (Figure 5) of next
generation Data Centres.
Zero Touch Cloud Automation capability
will help EITC to reduce OPEX over coming
years and at the same time will allow
handling of increasing levels of complexity
due to hardware, software and services
variations requiring on-demand and real-
time actions. Innovations in Energy
efficiency are key for EITC as it is
increasingly important to address power
consumption in Data Centres. As the number
and variety of applications using AI and
machine learning grow, hardware
accelerators, such as Graphics Processing
Unit (GPU) and FPGA that are tailored to
supporting AI processing and algorithms,
will find increasing use in Data Centres.
Networking approach typically called “leaf-
spine” architecture in Data Centres is a
design standard already being adopted at
EITC. Unlike the old hierarchical legacy
network architecture, it typically includes
“leaf” switches on the top of each rack or a
hyper-converged appliance that is
Figure 6. Telco Cloud building blocks
13. Defining Telco Cloud @ EITC
www.du.ae 13
interconnected among Data Centre “spine”
switches. This architecture provides EITC
significant advantages in Cloud environment
e.g. high elasticity within a Point of Delivery
(POD), and very high scalability in terms of
the number of PODs that can be installed and
optimized. Leaf-spine networking
architecture eliminates a tier of switches in
legacy networking configurations and traffic
flow within the Data Centre is also optimized
for performance.
SDN technology automates the network
configuration and provisioning, improves
network quality, reduces the risk of human
error, and provides faster time to market.
SDN enables unified network visualization
and coordination across the IP and optical
layers, increases network utilization and
improves network resiliency.
As increasing amount of data is stored in
Cloud-based Data Centres – whether
personal, financial, commercial, IoT
command and control systems. Data Centres
must provide the necessary Security
capabilities to protect against unauthorized
access and ensure safeguarding of the data.
Typical Telco Cloud deployment is likely to
have multiple Data Centres connected
through multi-service programmable IP and
Optical backbone network. Data Centres will
have capability to support multiple
virtualization technologies e.g. hypervisor
based (example: Open Stack) and container
based (e.g. Docker container) virtualization.
ETSI NFV reference architecture [4] is most
commonly adopted framework to host multi-
vendor Telco Virtual Network Functions
(VNFs).
ETSI reference architecture focuses on
changes likely to occur in a Telco network
due to introduction of NFV process. It has
clearly defined the functional block and main
reference points between those blocks. Key
functional blocks are:
NFVI: This consists of all hardware and
software components which build up the
environment where VNFs are hosted. It can
span across several locations and the
network providing connectivity between
these locations are also regarded as part of
NFVI. It creates a virtualization layer that
sits right above the hardware and abstracts
the HW resources, so they can be logically
partitioned and provided to the VNF to
perform their functions.
VIM: Virtual Infrastructure Manager (VIM)
is responsible for managing the virtualized
infrastructure. It comprises the
functionalities that are used to control and
Figure 7. Key drivers for Telco cloud adoption
14. Defining Telco Cloud @ EITC
www.du.ae 14
manage the interaction of a VNF with
computing, storage and network resources
under its authority, as well as their
virtualization.
VNFM: VNF Manager (VNFM) is
responsible for VNF lifecycle management
(e.g. instantiation, update, query, scaling,
and termination). Multiple VNF Managers
may be deployed in a network. VNF
Manager may be deployed for each VNF, or
a VNF Manager may serve multiple VNFs.
Generic Virtual Network Function Manager
is a preferred choice when it comes to do life
cycle management of multi-vendor VNFs.
NFVO: NFV Orchestrator (NFVO) oversees
the orchestration and management of NFV
infrastructure, software resources and
realizing network services on NFVI. It works
seamlessly in a multi-vendor environment
through ETSI defined interfaces.
FASTER TIME TO MARKET
THROUGH CLOUD AGILITY
In the era of the modern digital economy,
where software is expected to play an
increasingly dominant role in the future,
EITC needs to be agile and cost-efficient to
be successful in the market. The way to
achieve this is by adopting Software-defined,
Cloud-based next generation network and
transforming the Current Mode of
Operations to Future Mode of Operations
(FMO).
Agility and lower operational costs are the
key drivers of the networks of the future.
CSPs want agility with regards to innovation,
service deployment, auto scaling, order
turnaround and Time to market (TTM). For
instance, rapid and error-free provisioning of
services or scaling of capacity can be
realized through network Automation.
Another relevant example is through
Software Defined Network (SDN)
implementation where network traffic flow
can be dynamically adjusted to meet
changing needs. Greater business agility is
the prime motivator for EITC to prepare for
transforming the existing core network assets
to the Cloud because future success will
depend on being able to adapt the network
and businesses rapidly to market trends and
to support widely differing needs. In doing
this, EITC have a tremendous opportunity to
become a Digital Service Provider (DSP) by
leveraging their evolving networks, software
capabilities and relationships with their
subscribers.
Figure 8. Key principles for Cloud-native architecture
15. Defining Telco Cloud @ EITC
www.du.ae 15
In general, DSP organizations do few things
very efficiently, e.g. Sense Opportunities
(for example, sensing niche users who are
poorly served to existing products or an
adjacent market opportunity that the
organization can address), Seize
Opportunities (by quickly assembling
service systems to address those market
opportunities) and Operate efficiently (with
acceptable service quality to yield
sustainable business value).
The new 5G core architecture is based on
Cloud technologies, enabling capacity to be
scaled in or out elastically as demand
fluctuates. There is effectively no upper limit
on how much capacity can be added,
enabling EITC to cater to the demands of
even the largest next generation converged
networks. New software features can be
implemented faster and updates deployed
automatically to ensure EITC is using the
most advanced software, which also creates
a competitive advantage by offering the
latest services and features to subscribers.
TECHNOLOGY ROADMAP
EVOLUTION TOWARDS
CLOUD-NATIVE
The network of tomorrow is characterized by
network functions with simplified and
unified architecture, running on a common
Cloud infrastructure and providing open
APIs enabling operational Automation and
flexible support for new services and value-
added functions. Thereby the entire network
becomes more of an open ecosystem.
Such future networks are based on DevOps,
i.e. Operations working together with
development helps faster and more frequent
deployment of new software capabilities
directly into a live environment.
Microservices is an architectural style to
develop a single application as a suite of
small, independently deployable services,
Figure 9. Cloudification journey towards cloud-native and beyond
16. Defining Telco Cloud @ EITC
www.du.ae 16
that are built around business capabilities,
such as routing network traffic. Containers
encapsulate discrete components of
application logic (e.g. a microservice)
together with their dependencies,
provisioned only with the minimal resources
needed to do their job. Common
Infrastructure provides computing, storage
and networking resources, capable of
running Linux containers in VMs or on bare-
metal.
Cloud comes with certain benefits, e.g.
applications scale as needed, consume
services from one another, share compute
resources and data, and ignore limits of
underlying physical machines. Some of the
uncertainties seen are e.g. variable latency,
customer-specific policies for Security, fair
access and overload handling. A cloud-
native application is one that runs optimally
in the Cloud environment and takes full
advantage of its benefits. Cloud-nativeness
can be associated with certain architectural
principles as shown in the figure below.
To support continuous innovation, EITC
would have to develop a new architectural
framework e.g. micro services architectures.
The implementation of a micro services
architecture and containerization enables the
continuous delivery of large, complex
applications as loosely coupled services, thus
enabling shorter innovation cycles, increased
agility, improved scalability, and reduced
OPEX. With increased rate of DevOps
adoption, the path towards a true Cloud-
native approach becomes practical. However
most of the CSPs, including EITC, are at the
stage of implementing virtualization and
preparing the move to the Cloud. Hence the
timing for micro services and
containerization push needs to be carefully
selected. Micro services approach also
requires other elements to be in place, such
as DevOps, and yet many CSPs still don't
have these necessary building blocks in place
because they are wary of the radical cultural
change required, such as breaking down
legacy organizational silos and coming to
grips with new paradigms such as open
source. EITC believes that adoption of micro
services architectures is almost imminent,
but the timescales for adoption will vary.
There is a need as well to stress on the
business benefits. Migration to micro
services architectures and cloud-native
Network
Slicing
Total Cost of
Ownership
Open API
Data Analytics
Shared
Data Plane
DevOp Agility
Dynamic
Experience
Mgmt.
Operability &
Serviceability
Open
Architecture
Eco-System
Distributed
Edge &
Access Cloud
Fast service
introduction
Telco Cloud
Security
Digital Delivery
AppStore
Unbreakable
Core Quality
Cloud
Optimized
Core
Figure 10. Building Blocks for Cloud-native Core
Figure 11. Building blocks of programmable 5G core network
17. Defining Telco Cloud @ EITC
www.du.ae 17
applications is expected to be a gradual one.
Typical telco Cloud adoption journey
(Figure 9) can be defined in five major steps.
As an example, in next-generation network,
e.g. 5G, core network is being designed for
cloud-native architecture and principles
(Figure 10). The key target for the core
network is to provide all services over any
access technology utilizing a single core
while being able to optimize for a multitude
of service characteristics in an automated
manner. Cloud-native architectural [6]
principles for 5G Core are based on
“converge the network functions” and “to
enable the common architecture and
infrastructure” supporting extreme
Automation and flexibility. Adaptive 5G
core is decomposed into a micro service
architecture, leveraging independently
scalable, reusable Docker containers.
Infrastructure environment independence,
open element management, Leveraging
Open Source and Configurable service and
business logic. At EITC, we believe the
future for new technologies is now. EITC has
already started implementing a 5G network
with a clear “need oriented” approach. We
are working with our partners, to identify use
cases which can help EITC to resolve
existing challenges and constraints, build a
roadmap and timeline to launch new use
cases in the market.
18. www.du.ae 18
REORIENTING FOR FUTURE MODE
OF OPERATIONS
CLOUD OPERATIONAL
REQUIREMENTS
Advancing in the cloudification and 5G
journey requires changes in network
operational aspects. There are many drivers
impacting the scale of the operational
challenge.
- Multiple network slices – each in a way
triggering its own transactions as if it’s a
real physical network.
- Instead of dealing with a few services,
Operations must deal with many times
more micro-services.
- To make services smart and context
aware, Operations have to process
numerous new contexts change-related
transactions.
- Traffic and associated demand for
network resources are becoming
increasingly more variable and
unpredictable adding to provisioning
challenges.
- Larger scale of automation needs to be
adopted, e.g. to implement self-healing a
system needs to have the ability to
Figure 12. Complexity growth calls for Operations automation
19. Defining Telco Cloud @ EITC
www.du.ae 19
perceive that it is not operating correctly
and, with or without minimal human
intervention, make the necessary
adjustments to restore itself to normal
operation.
Transaction processing capacity will
improve with Moore’s law for hardware and
all the optimizations we can do with software
architectures for better scaling. However, it
appears that operations without any dramatic
change will be the bottleneck for realizing
the promise of better capital utilization or
scalable growth in pursuit of new revenues.
And this is where the predictive power of AI
and ML technologies must be put to use.
Viability or stability requires that Operations
can predict possible future events and, by
proactively taking the right steps, completely
prevent many transactions which would have
been triggered otherwise.
Without transforming the operations, the
entire vision of the network of the future will
be left unrealized, as it will simply be too
operationally complex and costly to
implement. The change will require
optimization of 4 “Ps”: the people,
processes, platforms and performance, with
the dominant P being people, as it is
ultimately people that define the other Ps:
processes, performance and platforms. The
key change on the people front will be
increasing the level of Automation, taking
people out of the minute-by-minute decision
process and relying on a high degree of
analytics with self/machine-learning and
optimization to increase agility and scale.
This will leave people more time to deal with
complex exceptions and deal with
increasingly improving processes, platforms
and performance. To successfully compete
in the new digital era, EITC will need to
support a high level of personalization and
autonomy. From a network user perspective
this will require that:
Both enterprise users and consumers are able
to rapidly explore new offers and modify
their current services with an ability to
choose any mix of pay-for-use or bulk-usage
models depending on which payment
Figure 13. Cognitive is the ultimate step in the evolution of Operations
20. Defining Telco Cloud @ EITC
www.du.ae 20
solution best matches the contextualized
needs of the user or enterprise.
There should be no perceived service
disruption or impairment as the network
adapts to changes in demand, capabilities,
services requirements, usage patterns or
impairments and failures. Any issue that
arises should be self-diagnosable and
resolvable without the need for operator
intervention. This is accomplished by
providing tools and intelligent virtual
assistants to solve problems without needing
to engage a customer support technician.
Extreme Automation of network operations
will be essential to support dynamic service
creation, management and value
optimization. Looking forward, there will be
one constant in network operations: change.
The future network will be subject to it
constantly.
- In network capabilities, as new
virtualized functions and capabilities are
added
- In services, as new applications are on-
boarded and service-chained to create
new service mash-ups
- In end points, as EITC customers (and
connected things) are added or modified,
or they move from one location to another
PATH TOWARDS CLOSED
LOOP AUTOMATION
Extreme Automation is a simple notion but
poses a lot of architectural challenges. To
address the complexity, the concept of
control loops is carefully designed so their
boundaries are clearly defined, limiting risk
and maintenance effort. Adherence to these
simple principles greatly reduces long-term
complexity, cost, technical risk, integration
and consistency.
Loop of control can span across multiple
domains (e.g. whole NFV stack – from NFVI
to external Assurance or Policy Enforcement
solution) or may be limited to a particular
domain with a clear control point, e.g. SDN,
VIM or VNFM. As stated in Research Note
“Closed loop Automation and the new role
of assurance” from Appledore Research
Figure 14. Operations driven by Automation and Analytics
21. Defining Telco Cloud @ EITC
www.du.ae 21
Group [1], Telecoms need not re-invent the
wheel: we can learn best practices from other
industries that have decades of experience
refining closed loops. Proven best practices
include loose coupling, nested loops, no
duplication of logic or data, and a
hierarchical “nested” structure. Nested loops
act first locally (simplification, risk
reduction); only if necessary should a larger
loop come into play. These best practices
reduce complexity, reduce risk and minimize
disruption as well inevitably add domains
and capabilities over time. When planning
for implementation of control loops EITC
needs to take into account a few factors:
- Architectural readiness of VNFs for
selected closed loop scenarios (like auto-
scaling, auto-healing).
- Capability of the systems considered for
the control point role – VIM, VNFM(s),
EMS, NFVO, SDN Controller, Umbrella
Assurance, External Policy Management.
- Abstraction level of the models used by
given loop control point.
Let us examine a few examples of loop
design process:
Figure 16. Closed loop automation can be realized on many levels of NFV stack
Figure 15. Assurance, Fulfillment, Assurance and Capacity Management automated in the closed loop.
22. Defining Telco Cloud @ EITC
www.du.ae 22
- VNFM cannot trigger scaling-out process
on a VNF if the internal architecture of
the VNF does not support it.
- It would not be practical to deal with
evacuation of Virtual Machines from
failed hosts by NFVO while VIM itself
can manage it via auto-evacuation
mechanism. Model of network service
maintained in NFVO simply does not
maintain enough details about individual
Virtual Machines.
- Disaster condition in one of Data Centres
may lead to the roll out of new Network
Service instance in another Data Centre.
Such decision needs to come from an
Umbrella system as NFVO might not
have enough details to trigger the
corrective action. It is a good design
practice to build closed loops within
domains to solve domain-specific
problem (e.g. SDN to deal with network
redundancy, VIM with failed hosts, EMS
with VNF performance), while letting
cross-domain systems like Orchestration,
Umbrella Assurance or external
centralized Policy Management to
control loops solving issues identified by
analysis of lower level KPI (e.g. related
to the service-level performance or
availability).
NETWORK SLICING AND
LIFECYCLE MANAGEMENT
Network slicing concept is one of the key
promises of 5G opening doors for new
business between EITC and its enterprise
partners. Requirements towards network
slicing will change over time following
EITC business decisions. For instance,
during 1st phase, like many other operators,
EITC could opt for vertical slicing. Later in
2nd
phase, EITC may consider including
consumer specific customizations.
Connected cars is a good example of 2nd
phase use case, where vendor specific
features and capabilities are applied to a
blueprint solution.
Example of Connected Car Solutions
by different vendors: Traffic Efficiency,
Traffic Safety, Infotainment, Vehicle
Interaction, Location, Tracking and Fleet
Figure 17. Infrastructure (Slice) as a Service types of offers
23. Defining Telco Cloud @ EITC
www.du.ae 23
management, Telematics, Security,
Communication, Emergency support.
Regardless of the approach, network slicing
requires mature Orchestration environment
and effective Operations processes. 3GPP
study TR28.801 [2] provides the definition
of Network Service Lifecycle management.
Each Network Slice Instance (NSI) can be in
one of 4 phases.
Preparation. In the preparation phase the
NSI is not created yet. This phase includes
the creation and verification of network slice
template(s), the on boarding of these,
configuration of the necessary network
environment supporting the lifecycle of NSIs
and any other preparations that are needed in
the network.
Instantiation, Configuration and
Activation. During
instantiation/configuration all resources
shared/dedicated to the NSI have been
created and are configured, i.e. to a state
where the NSI is ready for operation. The
activation step includes any actions that
makes the NSI active, e.g. diverting traffic to
it, provisioning databases (if dedicated to the
network slice, otherwise this takes place in
the preparation phase). NS instantiation,
configuration and activation can include
instantiation, configuration and activation of
Figure 18. Phases of Network Slice Instance Management. Source: 3GPP TR 28.801
Figure 19. End to End Network Slicing Management
24. Defining Telco Cloud @ EITC
www.du.ae 24
other shared and/or non-shared Network
Functions.
Run-time. In this phase the NSI is capable
of traffic handling to support communication
services of certain type(s). The run-time
phase includes supervision/reporting (e.g.
for KPI monitoring), as well as activities
related to modification. Modification could
map to several workflows related to runtime
tasks, e.g. upgrade, reconfiguration, NSI
scaling, changes of NSI capacity, changes of
NSI topology, association and disassociation
of network functions with NSI.
Decommissioning phase. The
decommissioning phase includes
deactivation (taking the NSI out of active
duty) as well as the reclamation of dedicated
resources (e.g. termination or re-use of
network functions) and configuration of
shared/dependent resources. After
decommissioning the NSI does not exist
anymore.
Execution of Network Slice Instance
management actions in each LCM phase
must happen across all the involved Network
Elements. Those Network Elements can be
located in distributed locations, managed by
different type of systems (VNF MANO, DC-
SDN, WAN-SDN, EMS) and connected by
different types of networks (e.g. Layer 2
Data Centre fabric, IP-MPLS transport).
Adding the multivendor factor, the high
degree of complexity of the whole ecosystem
requires Orchestration layer to be the central
place of modelling, inventory and life cycle
management of Network Slice Instances
(Figure 19).
DEVOPS FOR AGILE
TELECOM SERVICES
DELIVERY
The IT industry has long embraced DevOps;
the paradigm of fast development of
applications in close cooperation between
application provider and application
Operations team. The Telecom industry
wants to leverage the learnings and apply the
similar model to Telecom applications.
DevOps is a combination of philosophies,
practices and tools that companies can use to
address the opportunities of dynamic
markets. DevOps calls for tight cooperation
throughout the software lifecycle, from
planning and requirement management, to
operating the software.
Unlike traditional development and
Operations methodologies, DevOps relies on
Figure 20. DevOps pipeline: high level stages
25. Defining Telco Cloud @ EITC
www.du.ae 25
constant and immediate feedback at every
stage of the software lifecycle, from
customers and from the operational
environment, supported by continuous
monitoring of network Key Performance
Indicators (KPIs) and other means.
This feedback is vital for continuous
deployment, in which a flow of new
integrated and verified code is continuously
deployed into customers’ staging for
acceptance and then into production
environments. However, continuous and
fully automated deployment to production
challenges the telco world’s strict need for
very high network stability.
DevOps in the telco world requires vendors
and operators to collaborate across corporate
boundaries, unlike web-scale players in
which both development and Operations
reside within one company.
Furthermore, while web-scale production
systems are almost exclusively based on
Data Centres (Cloud) with unified resources
and infrastructure, the telco production
environment comprises assorted network
elements implemented over time.
Such challenges must be overcome to allow
telco vendors and EITC to constantly deploy
and verify the newest software in
production-like environments, verify their
compliancy and provide the necessary
feedback to development.
EITC runs multivendor networks. The
various vendors and partners therefore need
to agree a common DevOps framework and
Operations with the operator. This
commitment to continuous planning,
integration, testing and deployment will
deliver rapid innovation through
collaboration.
Continuous delivery in a multivendor
environment requires automated integration
and testing of all service components to
ensure high reliability of service. The
continuous technology evolution of a service
component results in dramatically reduced
deployment time, with frequent deliveries.
Such frequent deliveries call for continuous
service integration optimized for the high
number of component versions. Complexity
grows exponentially when the number of
service components and their individual
versions increases. Dealing with this
complexity is crucial.
While a growing number of operators are
adopting Cloud technologies, the full
benefits of Cloud-based Operations will only
be realized by fundamentally changing
software architecture. Current virtualized,
monolithic architecture will not provide the
speed and simplicity required by continuous
delivery, deployment and DevOps.
New software architecture based on
containerization and micro services will
enable rapid updates and flexible
Figure 21. Microservice architecture and DevOps
26. Defining Telco Cloud @ EITC
www.du.ae 26
deployments, eventually leading to
incremental and fast introduction of features.
Micro service architecture aims to develop a
single application comprising a suite of small
services, each running its own process and
communicating through a lightweight
mechanism. Common characteristics of this
architecture are:
- Autonomous systems: delivering
business value independent of other
services
- Simplicity: minimizing the number of
components and interactions
- Loose coupling between services
- Strong cohesion within services
- Sharing common services (as load
balancer, proxies) which avoid
duplicating functions
- Component level scaling versus full
service scaling (micro services can be
scaled without scaling the full network
element)
Continuous delivery and deployment require
a high level of automation throughout the
creation and operation of a product.
Continuous testing is also needed to achieve
the product stability and quality that a
DevOps environment requires.
Continuous testing by the vendor and
customer provides immediate and
continuous feedback on every code change
and every new feature. Automated testing
and feedback require a common end-to-end
test strategy. This helps ensure a focused
approach to high risk, high impact products
and solutions, while shared, automated
execution provides information and boosts
the flexibility and efficiency of vendors and
EITC. This enables them to more easily
define requirements and refine the Operation
of the software.
Smooth progress through the verification
stages also requires the Automation of
software delivery, deployment and updates.
This enables vendors and customers to use
their engineering skills to create innovative
ideas and build an event-driven system that
focuses on quality.
Continuous monitoring and feedback
encompass not just faults, but also normal
Operations and characteristics of software
products. Automated performance
monitoring provides insight into the
software’s behaviour that can be used to
guide performance improvements.
Continuous monitoring of errors enables
vendors and EITC to respond faster and more
effectively, as well as developing preventive
measures.
Unlike a web-scale organization, in which
development and Operations reside within
the same company, EITC as a CSP routinely
buys network components from several
vendors. Inevitably, the number of releases
that EITC would see will grow
exponentially, calling for equally numerous
compatibility checks.
Figure 22. Multivendor environment in the DevOps
methodology
27. Defining Telco Cloud @ EITC
www.du.ae 27
Synchronizing delivery from multiple
vendors is essential. Portions of the
operator’s infrastructure must also be open
to allow testing and verification of new
solutions. New channels for the automated
collection of customized operational
feedback on demand will also allow
development teams to improve their
components based on production data.
ANALYTICS AND AI/ML IN
THE FUTURE NETWORK
Increased complexity and rate of change in
networks driven by cloudification and 5G
makes full reliance on human design for
operational workflows unsustainable.
With help of AI/ML toolset, we can
autonomously identify patterns and
dependencies in complex and large data sets
(like root cause analysis or traffic
prediction). When integrated to the
Operations Automation workflow it can:
- Trigger for use cases, including
troubleshooting, scaling, and auto-
healing.
- Expert systems to aid problem resolution
and drive Automation workflow.
One of the first applications of AI/ML might
be Customer Care where chatbot and
autonomous care enhance the customer
experience and accuracy of problem solving.
Applied to a wider context, AI/ML would
chain and organize EITC use cases into AI
driven entire business process.
As a key enabler of digital intelligence
closed loop, AI/ML can enable access to
insight to various distinct areas like:
- Customer experience, device experience
(IoT), business SLA for B2B.
Figure 23. Applying AI for digital intelligence closed loop
Figure 24. Key Telecom domains addressable by AI/ML
28. Defining Telco Cloud @ EITC
www.du.ae 28
- New revenue opportunities e.g. new
enterprise in the network needing specific
service or monetization opportunities.
- Cost/resource saving opportunities.
Once opportunities or threats are identified,
they can be subsequently acted upon.
In Telecom ecosystem AI/ML includes also
human augmentation loop, where human
operators can manage business decision
making, supply more information or help
identify scenarios, which AI is not able to do.
As Telco AI is in its nature business
Operations AI (while with understanding
technology and its impact on business), it
connects to domain specific closed loop, e.g.
Orchestration, SON and 5G (slice and radio
management), which then execute their
actions based on recommendations triggers
from Telco AI and return/exchange data.
The potential applications of AI/ML
technology are numerous. Figure 24
summarizes only the key domains and use
cases.
29. Defining Telco Cloud @ EITC
www.du.ae 29
SECURITY FRAMEWORK FOR A
FUTURISTIC NETWORK
CLOUD BRINGS NEW
ASPECTS TO SECURITY
MANAGEMENT
Every Communications Service Provider
creates and follows a well-structured
corporate security policy. However, since
Network Function Virtualization represents
a radical change in the Telecom industry,
while the existing processes of Information
Risk Management [3] (e.g. specified in ISO
27005) do not change, there is a need to look
carefully to new boundaries introduced by
Cloud architectures and threats emerging at
them. ETSI NFV reference model clearly
defines interfaces between different entities
in the NFV architecture. Figure 25 depicts an
overlay boundary known as IaaS
(Infrastructure as a Service). This outlines
the separation between the network functions
and the supporting infrastructure.
EVOLUTION OF NFV AND
SECURITY STRATEGY
As one might imagine, the transition to NFV
will not occur overnight. Different
dimensions such as hardware, management,
automation, organization, applications and
Figure 25. IaaS boundaries in ETSI NFV reference architecture
30. Defining Telco Cloud @ EITC
www.du.ae 30
network must all evolve in order to reach the
full potential of NFV. These dimensions will
continue to evolve differently depending on
EITC’s roadmaps and commitments, as well
as on EITC’s capacity to execute
The focus of Security management changes
along with the NFV evolution. To illustrate
the migration paths, four Security focus
stages have been identified on the NFV
journey from first deployments to advanced
NFV.
Stage 1: Single VNF focus
Stage 2: NFVI focus
Stage 3: MANO focus
Stage 4: Highly distributed
Depending on the actual NFV evolution
stage different aspects of NFV Security may
require different amount of attention. Table
1 presents an example of selected key
Security objectives and their significance in
each NFV evolution stage.
Table 1. Example of significance of Security objectives in various phases of NFV evolution
Figure 26. Typical NFV evolution stages
Security Objectives Stage 1 Stage 2 Stage 3 Stage 4
Objective 1: Ensuring isolation *** *** *** ***
Objective 2: Vaildating topology * ** *** ***
Objective 3: Meeting new regulatory compliance ** ** *** ***
Objective 4: Protecting against DoS * ** *** ***
Objective 5: Tracking Security incidents * ** *** ***
31. Defining Telco Cloud @ EITC
www.du.ae 31
SECURITY ACROSS NFV
LAYERS
Many factors must be considered in the
design of NFV solutions that potentially
impact Security [5]. These include:
- Network function constraints, such as
network or processing performances,
(e.g. network throughput or the CPU I/O
rate).
- Emerging technologies to address
identified Security vulnerabilities, both
hardware and software (e.g., Input/output
Memory Management Unit (IOMMU)
against Direct Memory Access (DMA)
attacks).
- EITC assessment and selection of
technology (e.g. virtualization and
containers)
- Delivery schedule and constraints, (e.g.
planned maintenance windows)
- Operations constraints, (e.g. staff
availability and training level)
Based on this list, it is likely that EITC, the
VNF vendors, the third-parties (for example,
middleware or database providers), as well
as infrastructure providers (for example, an
operator of a private Cloud independent from
EITC) are all impacted by design choices.
For instance, specific VNF hardware
requirements, such as Trusted Platform
Module (TPM), Intel TXT, IOMMU and
Single Root Input/output Virtualization (SR-
IOV), may be incompatible with existing
hardware in a Data Centre. For the VNF
vendor alone, design choices will have
multiple impacts. Therefore, it is key to
identify these impacts early. To facilitate the
review of the available design options, the
“NFV stack” can be defined with its three
major layers:
- Hardware and firmware
Security Area Key Security topics
Trusted hardware and software TPM-based overall boot integrity: measure and validate BIOS and
hypervisor, seal data
Direct Device Assignment: assignment of PCI devices from the host
to the guest VMs
Virtualization and Cloud management
system Security
Cloud management system memory overcommitment: infrastructure
memory optimization
Memory ballooning: hypervisor feature for VM dynamic memory
management
Hypervisor memory optimization: kernel level memory de-
duplication
Cloud management system routing: integrated software routing for
interconnecting networks
Linux kernel Security: hardening of the system
VNF-level Security
VM swap encryption: application-level protection of swapped
memory
Remote attestation: secure exposure of the results of the trusted
launch process, enhancing end-to-end Security features for VNF
deployment and Operation
Table 2. Key Security topics to be addressed in today’s Cloud
32. Defining Telco Cloud @ EITC
www.du.ae 32
- Virtualization and Cloud management
system
- VNF and its EMS and MANO
Impact of the Security threats must be
always assessed across all these layers.
Table 2 lists the most common Security
topics that must be addressed in today’s
Clouds.
IAAS IMPACTS END-TO-END
CLOUD INFRASTRUCTURE
The infrastructure diversity may be impacted
by the Security choices. For instance, if there
is a need for a VNF to be end-to-end
encrypted and deployed on a specific server,
it also requires a hosting infrastructure with
remote attestation. Starting from an
infrastructure with highly diverse hardware
and software—some inherited and some
brand new—including the TPM-based
Overall Boot Integrity, Remote Attestation
will be more easily achieved with a
homogeneous infrastructure. This option
naturally reduces the future purchasing
options of the infrastructure provider. The
infrastructure dynamicity is also impacted by
the Security choices. For instance, starting
from an infrastructure with a defined number
of servers to host and enable the scaling of
the VNF services on top of it (see the left part
of Figure 27), and targeting to prevent over
commitment of memory at the Cloud
management system level, will require more
physical memory on existing servers and in a
second phase more servers (see the right part
of Figure 27).
EITC Corporate Security policy will be the
key factor to dimensioning of the Cloud Data
Centres. Certain rules regarding traffic
patterns or placement of the physical
compute hosts and distribution of workloads
may dictate the number of additional
equipment (hosts, routers, firewalls) to be
installed within Data Centres.
SDN IS IN THE HEART OF
CLOUD SECURITY
SDN brings new Security challenges to
networks when SDN controllers are
Figure 27. IaaS impact on end-to-end Cloud infrastructure
33. Defining Telco Cloud @ EITC
www.du.ae 33
implemented in Cloud environments and
when multiple, diverse applications are
admitted to “program the network”, i.e.
control network resources via the
controllers’ northbound interfaces. Solid
authentication and authorization concepts
and a very careful, security-aware design,
implementation, deployment and operation
of SDN controllers are required to maintain
network Security. The northbound interface
is a critical protection point to prevent
malicious applications from compromising a
controller via this interface and subsequently
exerting unauthorized control over network
resources.
SDN introduces a separation of forwarding
and control and thus introduces an interface
between SDN controller and SDN switch.
This interface makes the overall system more
vulnerable to attack. It could allow attacks on
the integrity and confidentiality of the
controller-switch communication, Denial of
Service (DoS) attacks, or attacks aiming at
gaining some control over switches and
controllers by exploiting vulnerabilities in
the protocol software or the interface
configuration. However, securing such
interface is a well-known task and suitable
means are readily available, such as usage of
IPsec or TLS to cryptographically protect the
legal communication and exclude all
communication faked by malicious third
parties.
Availability of northbound interface in SDN
Controller allows implementation of new
Security solutions that could use it to execute
central and at the same time, fine granular
and agile control over the network via an
SDN controller. Figure 28 gives a simplistic
example of a Security solution implemented
as an SDN application. This solution aims at
providing protection against Denial-of-
Service attacks. For this purpose, the
application (the Anti-DoS App) analyses
flow statistics retrieved from SDN switches
operating as ingress switches to a particular
network. By this, the Anti-DoS App detects
the DoS attack by a botnet (a coordinated set
of maliciously acting computers or
smartphones) against a target, for example a
WWW-server. Guided by policies, the Anti-
DoS App then blocks the malicious flows by
suitably instructing the SDN switches,
mitigating the DoS attack.
Figure 28. Securing the SDN
34. Defining Telco Cloud @ EITC
www.du.ae 34
DESIGN FOR SECURE NFVI
Without any measures, virtualized telco
applications would be arbitrarily placed by
the Virtual Infrastructure Management of the
Cloud, leading, for example, to a
constellation with a highly sensitive
application like the Home Subscriber Server
(HSS, user database) and a Web server on the
same hypervisor. While this doesn’t pose any
problem if the hypervisor’s logical
separation is working, it may lead to severe
Security implications once an attacker from
the Internet (accessing the web server)
succeeds in compromising the hypervisor by
exploiting a software vulnerability. In this
case, the logical separation is broken, and the
attacker may gain access to the sensitive
contents of the HSS database.
This threat can be mitigated by structuring
the virtualized telco network into Security
zones (also called “clusters” or “groups”).
Security zones ensure that only applications
with comparable functional criticality and,
therefore, similar Security requirements, are
placed on the same hypervisor. A good
example would be the protection of
virtualized network management systems
deployed in their own dedicated Security
zone, thus being logically and physically
separated from other telco Cloud
applications. In order to achieve this in a
highly automated way, the network function
orchestrator in conjunction with the virtual
network function manager – both defined by
ETSI NFV ISG - will be instrumented to set
up the Security zones within the virtualized
infrastructure and deploy the application
software accordingly. Ideally, the definition
of the Security zones should be agreed upon
between EITC and the Network Equipment
Provider (NEP), as the definitions are
influenced by the operator Security profile
and policies and those of the NEP. While the
‘Security zone’ concept doesn’t diminish the
probability of attacks, it however
significantly reduces their impact in the
event of a breach. Compliance with the
Security zones is also required when an
application is launched, moved or when the
Security profile of the application changes.
Traffic separation should complement the
principles of Security zones. This means,
similar to the nature of Security zones, traffic
with comparable functionality and Security
requirements – e.g. signalling, control, data –
is assigned to different virtual LANs
connecting the different telco applications,
thus avoiding mutual influences and
avoiding the danger that unauthorized access
to one type of traffic allows access to the
Figure 29. Example of Security Zones
Figure 30. Traffic separation example
35. Defining Telco Cloud @ EITC
www.du.ae 35
complete traffic. The Security zone concept,
as well as the traffic separation technique, is
already in use for physical network elements.
These must be carried over to a Cloud-based
network implementation, where there are
several different functional components that
have to support the set-up of such Security
zones and traffic separation.
From the Data Centre perspective, an
example of Security guiding principle might
be the introduction of physical firewalls
guarding traffic between Security zones in
various Data Centres. In this example, virtual
firewalls control traffic specific to the
application domain and create a part of
Network Service controlled by a NFVO.
CLOUD AND MULTI-
TENANCY
Today’s Clouds are by nature multi-tenant.
While in the past each physical network
function might have been configured to be
accessed by selected and a well-controlled
group of users, Cloud is based on a resource
sharing concept where each user runs its
application in shared virtualized
infrastructure. Cloud applications can come
from different vendors and be operated by
different teams. Therefore, it is of utmost
importance to control the access and log for
later audit the activities of all the Cloud
users.
Centralized Identity and Access
Management solution should provide single
sign-on and privileged identity management
capabilities with the scalability, resiliency,
and extensibility required by
telecommunications service provider. In this
way the centralization of administration,
access control, access and audit of all the
VNFs can be achieved.
Figure 31. Example of Security zones with physical firewalls controlling inter-zone traffic
36. www.du.ae 36
CONCLUSION
Today, EITC’s individual and enterprise
customers demand the ability to rapidly
explore new offers, modify their current
services, and to choose any mix of pay-for-
use or bulk-usage models depending on
which payment solution best matches their
individual contextualized needs.
To meet such demand, EITC needs to
significantly reduce the “time to market” and
bring service management “agility” to the
Operation. Future network technology
architecture on NFV and SDN provides such
capability. EITC has ambitious and forward-
looking visions to adopt such future oriented
technologies e.g. 5G aiming to bring much
faster innovation to the market and offer
individualized, highly customized and
personalized services. On the other hand,
service agility and operational efficiency can
be realized through acceleration of network
Automation and Orchestration.
Successful deployment of new technologies
hinges on a huge amount of due diligence and
research that needs to be done, including
vendor engagement, trials and testing. This
requires a careful balancing act of a business
case with realistic targets, investment,
technology roadmaps and skills development.
EITC is engaged with experienced partners in
this technology domain, to ensure that any
current investments are futureproofed with a
well-defined and smooth implementation
path.
Adoption of the Telco Cloud with NFV and
SDN technologies needs to be diffused
throughout EITC as it has a far-reaching
impact on the current organization and
operational processes. Hence the most
effective way forward for EITC is to take a
modular and pragmatic approach, as well as
incremental steps to enable new
individualized and contextualized services.
37. Defining Telco Cloud @ EITC
www.du.ae 37
ACRONYMS
5G Fifth generation of mobile telecommunication networks
API Application Programming Interface
CI/CO Continuous Integration/Continuous Operations
CPU Central Processing Unit
CSP Communications Service Provider
DC Data Centre
DDOS Distributed Denial of Service
DevOps Software development (Dev) and technology Operations (Ops)
DMA Direct Memory Access
DSP Digital Service Provider
EMS Element Management System
ETSI European Telecommunications Standards Institute
FMO Future Mode of Operations
FPGA Field-Programmable Gate Array
GPU Graphics Processing Unit
IaaS Infrastructure-as-a-Service
I/O Input/ Output
IOMMU Input/ Output Memory Management Unit
IoT Internet of Things
KPI Key Performance Indicator
MANO Management and Operations
MEC Mobile Edge Computing
ML Machine Learning
NEP Network Equipment Provider
NFV Network Functions Virtualization
NFVI Network Functions Virtualization Infrastructure
NFVO Network Functions Virtualization Orchestrator
OAM Operations and Maintenance
OPEX Operating Expense
POD Point of Delivery
QoS Quality of Service
QoE Quality of Experience
SDN Software-Defined Networking
SR-IOV Single Root Input/ Output Virtualization
TPM Trusted Platform Module
TTM Time To Market
VIM Virtual Infrastructure Manager
VM Virtual Machine
VNF Virtual Network Function
38. Defining Telco Cloud @ EITC
www.du.ae 38
WORKS CITED
[1] Appledore Research Group: Closed-Loop-Automation-and-the-New-Role-of-
Assurance-Research-Note-SF
[2] 3GPP TR 28.801:
https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?spe
cificationId=3091
[3] ISO 27005: https://www.iso.org/standard/75281.html
[4] ETSI NFV Reference Architecture: https://www.etsi.org/technologies/nfv
[5] Nokia white paper on NFV migration Top 5 security risks, NFV security’s 9 top
impacting choices: https://networks.nokia.com/solutions/network-functions-
virtualization-nfv
[6] Further reading 5G-PPP Software Network Working Group from Web scale to Telco,
the Cloud Native Journey: https://5g-ppp.eu/wp-content/uploads/2018/07/5GPPP-
Software-Network-WG-White-Paper-23052018-V5.pdf
39. Defining Telco Cloud @ EITC
www.du.ae 39
CONTRIBUTION
THIS PAPER WAS JOINTLY
DEVELOPED BY EITC AND NOKIA