Presentation on 3GPP standard specified PNI-NPN/SNPN also in marketing terms denoted as "Private 5G". The presentation also provides some insights on the evolvement of PNI-NPN/SNPN for the coming 3GPP Release denoted as "5G Advanced" that shall specify inter-operability and roaming between "equivalent NPNs/SNPNs and NPN/SNPNs access to Non-3GPP Access.
5G/NR wireless communication technology overview, architecture and its operating modes SA and NSA. Also an introduction to VoNR and other services overview of 5G network.
The key technologies of 5G namely MIMO and Network slicing are also explained.
The slides givews an overview of the Ericsson 5G training program for 2018, including fundamentals as well as technical overviews of 5G Core and 5G RAN.
Intermediate: 5G Applications Architecture - A look at Application Functions ...3G4G
In this tutorial we look at the 5G Applications architecture. We discuss 5G applications, application functions and application servers and how they fit together in a 5G Service Based Architecture
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
5G Page: https://www.3g4g.co.uk/5G/
Free Training Videos: https://www.3g4g.co.uk/Training/
A detailed look at what is meant by private networks, why do we need them and why the sudden interest in them. Also discussed is the 3GPP defined 5G Non-Public Networks (NPN), they architecture, implementation, pros and cons. In addition RAN sharing and Campus Networks are also discussed with regards to where they fit in the private networks.
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
5G Page: https://www.3g4g.co.uk/5G/
Free Training Videos: https://www.3g4g.co.uk/Training/
5G/NR wireless communication technology overview, architecture and its operating modes SA and NSA. Also an introduction to VoNR and other services overview of 5G network.
The key technologies of 5G namely MIMO and Network slicing are also explained.
The slides givews an overview of the Ericsson 5G training program for 2018, including fundamentals as well as technical overviews of 5G Core and 5G RAN.
Intermediate: 5G Applications Architecture - A look at Application Functions ...3G4G
In this tutorial we look at the 5G Applications architecture. We discuss 5G applications, application functions and application servers and how they fit together in a 5G Service Based Architecture
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
5G Page: https://www.3g4g.co.uk/5G/
Free Training Videos: https://www.3g4g.co.uk/Training/
A detailed look at what is meant by private networks, why do we need them and why the sudden interest in them. Also discussed is the 3GPP defined 5G Non-Public Networks (NPN), they architecture, implementation, pros and cons. In addition RAN sharing and Campus Networks are also discussed with regards to where they fit in the private networks.
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
5G Page: https://www.3g4g.co.uk/5G/
Free Training Videos: https://www.3g4g.co.uk/Training/
5G Network Architecture, Design and Optimisation3G4G
Presented by Prof. Andy Sutton, Principal Network Architect, Architecture & Strategy, TSO, BT at The IET '5G - State of Play' conference on 24th January 2018
*** SHARED WITH PERMISSION ***
This updated presentation/video looks at 5G Network Architecture options that have been proposed by 3GPP for deployment of 5G. It covers the Standalone (SA) and Non-Standalone (NSA) architecture. In the NSA architecture, EN-DC (E-UTRA-NR Dual Connectivity), NGEN-DC (NG-RAN E-UTRA-NR Dual Connectivity) and NE-DC (NR-E-UTRA Dual Connectivity) has been looked at. Finally, migration strategies proposed by vendors and operators (MNOs / SPs) have been discussed.
Prof. Andy Sutton: 5G RAN Architecture Evolution - Jan 20193G4G
This presentation explores the evolution of GSM, UMTS and LTE radio access network architectures before a detailed review of the RAN architecture options for 5G. The functional decomposition of the 5G radio access network presents the network designer with many challenges with regards placement of RU, DU and CU nodes, all of which are discussed. The presentation concludes with a review of BT UK plans for 5G launch with a fully distributed RAN in support of an EN-DC architecture.
Presented by Professor Andy Sutton CEng FIET, Principal Network Architect, Architecture & Strategy, BT Technology at IET 5G - the Advent conference on 30 January 2019 | IET London: Savoy Place
*** SHARED WITH PERMISSION ***
With 5G use cases placing more demanding requirements on the networks, Ericsson is strengthening its end-to-end mobile transport solutions by building on its radio expertise and adding best-in-class transport technologies from Juniper Networks and ECI Telecom.
I have described VoLTE IMS Architecture in simplified way . Are you also finding 3GPP Specs complicated & Complex for VoLTE IMS . It covers Role played by individual Networks Elements as mentioned below :-
# VoLTE SIP Handset : SIP Support , UAC , UAS , User Agent , SIP-UA
# Underlying LTE Network : MME , SGW , PGW , PCRF , HSS , Dedicated Bearer , QCI , Default Bearer
# IMS Core : SIP Servers , P-CSCF , I-CSCF , S-CSCF , TAS , MMTEL , BGw , MRF , ATCF , ATGW , IBCF , MGCF , IM-MGW , TrGW
# Voice Core or PSTN Network for Break-in or Break-out Calls
Webinar topic: Radio Optimization In Telco
Presenter: Achmad Mardiansyah, Yoyok Dwi Parindra
In this webinar series, Radio Optimization In Telco
Please share your feedback or webinar ideas here: http://bit.ly/glcfeedback
Check our schedule for future events: https://www.glcnetworks.com/en/schedule/
Follow our social media for updates: Facebook, Instagram, YouTube Channel, and telegram also discord
Recording available on Youtube
https://youtu.be/M0sAMZHqziA
A quick look at 5G System architecture in Reference point representation and in Service Based representation and also look at the different Network Functions (NFs) within the 5G System.
Technology Manager Andreas Roessler covers 5G basics in this keynote presentation at the RF Lumination 2019 conference in February 2019.
RF Lumination 2019
"Meet 158+ years of RF design & test expertise at one event. If they can't answer your question, it must be a really good question!"
Watch all the presentations here:
https://www.rohde-schwarz-usa.com/RFLuminationContent.html
Andreas Roessler is the Rohde & Schwarz Technology Manager focused on UMTS Long Term Evolution (LTE) and LTE-Advanced. With responsibility for the strategic marketing and product portfolio development for LTE/LTE-Advanced, Andreas follows the standardization process in 3GPP very closely, particularly on core specifications as well as protocol conformance, RRM and RF conformance specifications for device and base stations testing. He graduated from Otto-von-Guericke University in Magdeburg, Germany, and received a Master's Degree in communication engineering.
This presentation and video looks at the concept of Open RAN, White Bix RAN and Virtualized RAN (vRAN). It looks at the motivation to move away from traditional architectures where the vendor supplies their own proprietary hardware and software to the new Open RAN architecture movement. Business case from an MNO / SP point of view is discussed and the results from joint Open RAN RFI by Telefonica and Vodafone is discussed.
Ike Al Pres on 5G and 5G Advanced selected Capabilities to LF Edge Akraino Su...Ike Alisson
Insights into 3GPP specifications for "5G Advanced" release related to both, insights and pace of development related to "equivalent" NPNs/SNPNs (Private Networks) with support to non 3GPP Access and providing support for Localized Services, APIs evolvement for realization of Service Enablement Framework Services, Analytics on System & Application level, Enhacements on System & Application level for developing Applications/Service on the Edge, exemplifying the alignment between 3GPP EDGEAPP & ETSI MEC Architectures as part of the GSMA proposed in June 2021 Solution for providing E2E Solution for Edge Applications & some insights on the O-RAN Alliance SMO related non RT-RIC related to rApps.
Introduce IPv6 related activities in ITU-T especially focused on SG13 and near future expectation of using IPv6 jointly with Ubiquitous Networking concept.
5G Network Architecture, Design and Optimisation3G4G
Presented by Prof. Andy Sutton, Principal Network Architect, Architecture & Strategy, TSO, BT at The IET '5G - State of Play' conference on 24th January 2018
*** SHARED WITH PERMISSION ***
This updated presentation/video looks at 5G Network Architecture options that have been proposed by 3GPP for deployment of 5G. It covers the Standalone (SA) and Non-Standalone (NSA) architecture. In the NSA architecture, EN-DC (E-UTRA-NR Dual Connectivity), NGEN-DC (NG-RAN E-UTRA-NR Dual Connectivity) and NE-DC (NR-E-UTRA Dual Connectivity) has been looked at. Finally, migration strategies proposed by vendors and operators (MNOs / SPs) have been discussed.
Prof. Andy Sutton: 5G RAN Architecture Evolution - Jan 20193G4G
This presentation explores the evolution of GSM, UMTS and LTE radio access network architectures before a detailed review of the RAN architecture options for 5G. The functional decomposition of the 5G radio access network presents the network designer with many challenges with regards placement of RU, DU and CU nodes, all of which are discussed. The presentation concludes with a review of BT UK plans for 5G launch with a fully distributed RAN in support of an EN-DC architecture.
Presented by Professor Andy Sutton CEng FIET, Principal Network Architect, Architecture & Strategy, BT Technology at IET 5G - the Advent conference on 30 January 2019 | IET London: Savoy Place
*** SHARED WITH PERMISSION ***
With 5G use cases placing more demanding requirements on the networks, Ericsson is strengthening its end-to-end mobile transport solutions by building on its radio expertise and adding best-in-class transport technologies from Juniper Networks and ECI Telecom.
I have described VoLTE IMS Architecture in simplified way . Are you also finding 3GPP Specs complicated & Complex for VoLTE IMS . It covers Role played by individual Networks Elements as mentioned below :-
# VoLTE SIP Handset : SIP Support , UAC , UAS , User Agent , SIP-UA
# Underlying LTE Network : MME , SGW , PGW , PCRF , HSS , Dedicated Bearer , QCI , Default Bearer
# IMS Core : SIP Servers , P-CSCF , I-CSCF , S-CSCF , TAS , MMTEL , BGw , MRF , ATCF , ATGW , IBCF , MGCF , IM-MGW , TrGW
# Voice Core or PSTN Network for Break-in or Break-out Calls
Webinar topic: Radio Optimization In Telco
Presenter: Achmad Mardiansyah, Yoyok Dwi Parindra
In this webinar series, Radio Optimization In Telco
Please share your feedback or webinar ideas here: http://bit.ly/glcfeedback
Check our schedule for future events: https://www.glcnetworks.com/en/schedule/
Follow our social media for updates: Facebook, Instagram, YouTube Channel, and telegram also discord
Recording available on Youtube
https://youtu.be/M0sAMZHqziA
A quick look at 5G System architecture in Reference point representation and in Service Based representation and also look at the different Network Functions (NFs) within the 5G System.
Technology Manager Andreas Roessler covers 5G basics in this keynote presentation at the RF Lumination 2019 conference in February 2019.
RF Lumination 2019
"Meet 158+ years of RF design & test expertise at one event. If they can't answer your question, it must be a really good question!"
Watch all the presentations here:
https://www.rohde-schwarz-usa.com/RFLuminationContent.html
Andreas Roessler is the Rohde & Schwarz Technology Manager focused on UMTS Long Term Evolution (LTE) and LTE-Advanced. With responsibility for the strategic marketing and product portfolio development for LTE/LTE-Advanced, Andreas follows the standardization process in 3GPP very closely, particularly on core specifications as well as protocol conformance, RRM and RF conformance specifications for device and base stations testing. He graduated from Otto-von-Guericke University in Magdeburg, Germany, and received a Master's Degree in communication engineering.
This presentation and video looks at the concept of Open RAN, White Bix RAN and Virtualized RAN (vRAN). It looks at the motivation to move away from traditional architectures where the vendor supplies their own proprietary hardware and software to the new Open RAN architecture movement. Business case from an MNO / SP point of view is discussed and the results from joint Open RAN RFI by Telefonica and Vodafone is discussed.
Ike Al Pres on 5G and 5G Advanced selected Capabilities to LF Edge Akraino Su...Ike Alisson
Insights into 3GPP specifications for "5G Advanced" release related to both, insights and pace of development related to "equivalent" NPNs/SNPNs (Private Networks) with support to non 3GPP Access and providing support for Localized Services, APIs evolvement for realization of Service Enablement Framework Services, Analytics on System & Application level, Enhacements on System & Application level for developing Applications/Service on the Edge, exemplifying the alignment between 3GPP EDGEAPP & ETSI MEC Architectures as part of the GSMA proposed in June 2021 Solution for providing E2E Solution for Edge Applications & some insights on the O-RAN Alliance SMO related non RT-RIC related to rApps.
Introduce IPv6 related activities in ITU-T especially focused on SG13 and near future expectation of using IPv6 jointly with Ubiquitous Networking concept.
Akraino API TSC Ike Alisson 5G Mobility Edge MEC synergy present 2020 11 06 R...Ike Alisson
Edge in 5G Mobility context evolvement from NGMN 5G WP in Feb 2015 and ETSI MEC renaming MEC to Multi-access Edge Computing by March 2017 and setting Phase 2 New Scope with some examples from 3GPP Rel 15 NSA New Services and System Aspects enhancements revisiosn preceding ETSI MEC renaming and latest 5G Capabilities for Traffic Routing & Service Steering impact on MEC and latest support for AVT (Alternative Virtualized Technologies) and 5G SCEF/NEF SCS/AS for CIoT integrated (like in 5G MEC case through CAPIF/NAPS) with 5G SL IoT Platform oneM2M with support to Ontology SAREF across 10 UCs.
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...SecurityGen1
Empower your defense against DDoS attacks with SecurityGen's comprehensive approach to prevention. Beyond merely blocking attacks, SecurityGen focuses on understanding the unique challenges your business faces. Our DDoS Attack Prevention goes beyond traditional measures, incorporating real-time threat intelligence and behavioral analysis. By choosing SecurityGen, businesses gain a holistic defense strategy that adapts to emerging threats. With SecurityGen's comprehensive approach, organizations can confidently navigate the digital landscape, knowing that their digital assets are protected against the evolving nature of DDoS attacks.
Wi-Fi has been ubiquitous on Enterprise and Industrial environments. Fast evolution
a great promise in fact made some MNOs and Fixed Service Providers to build their
own “complementary” Wi-Fi networks, especially due to the high costs on 3G
deployment.
During the 4G rollout, technology evolution has tilted the scale back for MNOs, but
Wi-Fi was still the standard for enterprises. Enhanced-LTE and 5G are now
challenging this reality.
The specifications for reliability, high speed, low latency, high density, and powe
Wi-Fi has been ubiquitous on Enterprise and Industrial environments. Fast evolution
a great promise in fact made some MNOs and Fixed Service Providers to build their
own “complementary” Wi-Fi networks, especially due to the high costs on 3G
deployment.
During the 4G rollout, technology evolution has tilted the scale back for MNOs, but
Wi-Fi was still the standard for enterprises. Enhanced-LTE and 5G are now
challenging this reality.
The specifications for reliability, high speed, low latency, high density, and powe
Report of the LTE breakout session (NB-IoT) by Mediatek Inc. (Session Chair)Yi-Hsueh Tsai
7.16 WI: Narrowband IOT
(NB_IOT-Core; leading WG: RAN1; started: Sep. 15; target: Mar. 16; WID: RP-151621)
Time budget: N/A
Overall: At this meeting we need to determine the scope of the work. Which parts of LTE TSes to be reused, which parts are not applicable, which parts need change. Identification of issues and candidate solutions. The mindset should be that Requirements in TR 45.820 shall be fulfilled.
This report describes the 5G requirements, use cases and technologies which are modelling the transformation of the core network and a roadmap how the 3GPP Evolve Packet Core can be modified to become the core for the 5G networks.
Narrowband Internet of Things - R&S Whitepaper3G4G
Available to download from: https://www.rohde-schwarz.com/uk/applications/narrowband-internet-of-things-white-paper_230854-314242.html
Shared with permission
Entendre els fonaments de la tecnologia i conèixer com ens impactarà el seu desplegament. Vam descobrir les diferents aplicacions que tindrà el 5G en el nostre dia a dia i el valor que aportarà
5G will connect billions of devices, things and people and bring an Ocean of new opportunities to cope with continuous traffic growth, low latency service expectations, energy efficiency, urban density and many other requirements demanding more and more innovation in the CMOS, MEMS and Protonics space but also many other areas.
AI ML 2023 Measuring Trends Analysis by Stanford UniversityIke Alisson
This year, the Stanford Institute for Human-Centered Artificial Intelligence (HAI) 386 pages Report introduces more original data than any previous edition, including a new Chapter on AI Public Opinion, a more thorough Technical Performance Chapter, Original Analysis about Large Language and Multimodal Models, detailed Trends in Global AI Legislation Records, a Study of the Environmental Impact of AI Systems, and more. On the "success" of AI ML on the Market, w.r.t. Chapter 4, indicating: "Corporate Investment (Mergers/Acquisitions, Minority Stakes, Private Investment, & Public Offerings) dipped in 2022 to 190 billion from 2021 amount of 276 billion highs, but the number has still increased 13-fold in the last decade. The Biggest Investment event of the Year was the Nuance Communications acquisition; the Computer SW Tech Company was picked up by Microsoft for $19.7 billion."
IKAL IoT PINS (Personal IoT Networks) in Netw & Applic layers with selected 5...Ike Alisson
Personal IoT Networks (PINs) and Customer Premises Networks (CPNs) provide local connectivity between UEs and/or non-3GPP devices. The CPN via an eRG, or PIN Elements via a PIN Element with Gateway Capability (PEGC) can provide access to 5G Network Services for the UEs and/or non-3GPP devices on the CPN or PIN.
The 5G System shall be able to support access to the 5G Network and its Services via at least one (1) Gateway (i.e. PIN Element with Gateway Capability PEGC, or eRG) for "authorised UEs" and "authorised non-3GPP devices"in a PIN or a CPN. The 5GS (System) shall be able to support IP traffic offload to Data Network for a CPN. A Personal IoT Network (PIN) consists of PIN Elements (PINE) that communicate using PIN "Direct Connection" or "direct network connection" and is managed locally (using a PIN Element with Management Capability, PEMC). Via a PIN Element with Gateway Capability (PEGC), PIN Elements have access to the 5G Network Services and can communicate with PIN Elements that are not within range to use PIN Direct Connection. A PIN includes at least one PIN Element with Gateway Capability and at least one PIN Element with Management Capability. Only a 3GPP UE can act as PEGC and/or PEMC. A PIN Element with Management Capability, PEMC, is a PIN Element that provides a means for an authorised administrator to configure and manage a PIN. The 5GS shall enable a UE or non-3GPP device in a CPN or PIN to discover other UEs or non-3GPP devices within the same CPN or PIN subject to acess rights. The 5G S shall efficiently support service discovery mechanisms where a UE or non-3GPP device in a CPN or PIN can discover, subject to access rights, "availability" and "reachability" of other entities (e.g. other UEs or non-3GPP devices) on the CPN or PIN. The 5G System shall provide "User Privacy", "Location Privacy", "Identity Protection" and "Communication Confidentiallity" for non-3GPP devices and UEs that are using the PIN Element with Gateway Capability (PEGC), eRG or PRAS. "Privacy" protection should not block differentiated routing and QoS for different destinations and Services for the UE(s). The 5GS shall support Authentication of a UE with 3GPP Credentials for Communication with entities (UEs, non-3GPP devices) in a CPN. The PIN can also have a PIN Application Server (AS) that includes an AF (Application Function) functionality. The AF can be deployed by Mobile Operator or by an Authorized Third (3rd) Party. The 5GS shall support Real-time E2E QoS (Quality ofService) Monitoring and Control for any intra-CPN Data Traffic to or from a UE (i.e. via eRG or via PRAS and eRG). The 5GS shall support Charging Data collection for Data Traffic to/from individual UEs in a CPN or PIN (i.e., UEs behind the PIN Element with Gateway Capability (PEGC) or eRG and/or PRAS). "Relay selection" within a PIN is enabled for both UEs and non-3GPP device and, through 5GS, supports a Mechanism for a PIN Element to select a relay for PIN direct connection.
CNCF TUG (Telecom User Group) Ike Alisson 5G New Service Capabilities Rev pa10Ike Alisson
5G New Service Capabilities (with an overview on the synergy between 5G CN and RAN (O-RAN Specifications) via CUPS and some of the Enhancements for URLLC UCs enhancements
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
2. Table of Contents
1. 3GPP Definition of PNI - NPN/SNPN with Diagrams
2. Market Definition and Deployments of "Private 5G" PNI - NPN/NSPN
3. Examples of PNI-NPN/SNPN Standard defined Configurations and Capabilities
(re.: KIs/UCs & Solutions)
2
3. A Non-Public Network (NPN) is a 5GS deployed for Non-Public Use
An NPN is either:
1. a Stand-alone Non-Public Network (SNPN), i.e. operated by an
NPN Operator and not relying on Network Functions provided by a
PLMN,
or
2. a Public Network Integrated NPN (PNI-NPN), i.e. a Non-Public
Network deployed with the support of a PLMN.
NOTE: An NPN and a PLMN can share NG-RAN
Stand-alone Non-Public Networks (SNPNs)
SNPN 5GS deployments are based on the Architecture for:
- 5GC with Un-trusted Non-3GPP Access (Fig. 1-1) for access to SNPN
Services via a PLMN (and vice versa)
1. 3GPP Definition of PNI - NPN/SNPN with Diagrams- 1
Ref.: 3GPP, Rel. 17
4. Alternatively, a Credentials Holder (CH) may Authenticate and Authorize access to an SNPN.
In this Rel. 17, Direct Access to SNPN is specified for 3GPP Access only.
1. 3GPP Definition of PNI - NPN/SNPN with Diagrams - 2
Ref.: 3GPP, Rel. 17
5. Identifiers
The combination of a PLMN ID and Network identifier (NID) identifies an SNPN.
NOTE 1: The PLMN ID used for SNPNs is not required to be unique. PLMN IDs reserved
for use by private networks can be used for non-public networks, e.g. based on
mobile country code (MCC) 999 as assigned by ITU. Alternatively, a PLMN
operator can use its own PLMN IDs for SNPN(s) along with NID(s), but registration
in a PLMN and mobility between a PLMN and an SNPN are not supported using
an SNPN subscription given that the SNPNs are not relying on network functions
provided by the PLMN.
The NID shall support two assignment models:
- Self-assignment: NIDs are chosen individually by SNPNs at deployment time (and may
therefore not be unique) but use a different numbering space than the coordinated
assignment NIDs.
- Coordinated assignment: NIDs are assigned using one of the following two options:
1. The NID is assigned such that it is globally unique independent of the PLMN ID used;
or
2. The NID is assigned such that the combination of the NID and the PLMN ID is
globally unique.
NOTE 2: Which legal entities manage the number space is beyond the scope of this
specification.
NOTE 3: The use of SNPN with self-assignment model NID such that the combination of
PLMN ID and NID is not globally unique is not assumed for the Architecture
described in Figure 5.30.2.9.3-1, Figure 5.30.2.9.2-1. and for SNPN - SNPN
Mobility as described in clause 5.30.2.11.
1. 3GPP Definition of PNI - NPN/SNPN with Diagrams- 3
Ref.: 3GPP, Rel. 17
6. As of 3GPP Rel. 17, the following 5GS features and functionalities are not
supported for SNPNs:
1. Interworking with EPS is not supported for SNPN.
2. Emergency Services are not supported for SNPN when the UE accesses the SNPN
over NWu via a PLMN.
3. While Roaming is not supported for SNPN, e.g. Roaming between SNPNs, it is
possible for a UE to access an SNPN with credentials from a CH
4. Hand-over between SNPNs, between SNPN and PLMN or PNI-NPN are not
supported.
5. CIoT 5GS Optimizations are not supported in SNPNs.
6. CAG (Closed Access Group) is not supported in SNPNs.
- A UE with two (2) or more Network Subscriptions, where one (1) or more Network
Subscriptions may be for a subscribed SNPN, can apply procedures specified for Multi-
USIM UEs.
- The UE shall use a separate PEI for each network subscription when it registers to the
network.
NOTE: The number of preconfigured PEIs for a UE is limited.
If the Number of Network Subscriptions for a UE is greater than the Pre-configured
Number of PEIs, the Number of Network Subscriptions that can be registered with the
Network simultaneously is restricted by the Number of Pre-Configured Number of PEIs.
1. 3GPP Definition of PNI - NPN/SNPN with Diagrams - 4
Ref.: 3GPP, Rel. 17
7. NPN/SNPN Mapping Solutions to Key Issues - 3GPP Rel. 17
Key Issues
Nr
Solutions
#1
Enhancements to Support SNPN
along with Credentials owned by
an Entity separate from the SNPN
#2:
NPN support for Video, Imaging
and Audio for Professional
Applications (VIAPA)
#3
Support of IMS Voice and
Emergency Services for
SNPN
#4
UE Onboarding and Remote
Provisioning
#5
Support for Equivalent SNPNs
#6
Support of Non 3GPP
Access for NPN
Services
1 X X
2 X X
3 X
4 X
5 X
6 X
7 X
8 X
9 X
10 X
11 X
12 X
13 X
14 X
15 X
16 X
17 X
18 X
19 X
20 X
21 X
22 X
23 X
24 X
25 X
26 X
27 X
28 X
29 X
30 X
31 X
32 X
33 X
34 X
35 X
36 X
37 X
38 X
39 X
40 X
41 X
42 X
43 X
44 X
45 X
46 X
47 X
48 X
49 X
50 X
51 X
52 X
53 X
54 X
55 X
56 X Ref.: 3GPP, Rel. 17
9. 5G ACT & ACR (Application Context Transfer & Application Context Relocation for Service Continutiy T-EAS & S-EAS
Ref.: 3GPP, Rel. 17
10. 2. Market Definition and Deployments of "Private 5G" PNI - NPN/NSPN - 1
2.1 The Demand for Private Mobile Networks based on 4G LTE (and increasingly 5G)
Technologies is being driven by:
- The spiralling Data,
- Security,
- Digitisation and
- Enterprise Mobility Requirements of modern Business and Government entities.
11. 2. Market Definition and Deployments of "Private 5G" PNI - NPN/NSPN - 2
2.2 The Definition of a Private Mobile Network used in this report is a 3GPP-based 4G LTE or 5G
Network intended for the sole use of Private Entities, such as Enterprises, Industries & Governments
The definition includes Multe-Fire or Future Railway Mobile Communication System. The
Network must use Spectrum defined in 3GPP, be generally intended for Business-Critical or Mission-
Critical Operational needs, and where it is possible to identify Commercial Value,
Non-3GPP Networks such as those using Wi-Fi, TETRA, P25, WiMAX, Sigfox, LoRa and proprietary
technologies are excluded from the data set.
12. 2. Market Definition and Deployments of "Private 5G" PNI - NPN/NSPN - 3
2.3 GSA has been working with Executive Members Ericsson, Huawei and Nokia on harmonising
definitions of what counts as a valid Private Mobile Network, and on harmonising sector definitions.
That work has led to a re- statement of some of GSA’s market statistics.
13. 2. Market Definition and Deployments of "Private 5G" PNI - NPN/NSPN - 4
2.4 Private Mobile Networks are usually not offered to the General Public, although GSA’s analysis
does include the following:
- Educational Institutions that provide Mobile BroadBand (MBB) to Student Homes;
- Private Fixed Wireless Access Networks (PFWAN) deployed by Communities for Homes and
Businesses;
- City or Town Networks that use local licences to provide wireless services in Libraries or Public
Places (possibly offering Wi-Fi with 3GPP Wireless Backhaul) which are not an extension
of the Public Network.
14. 2. Market Definition and Deployments of "Private 5G" PNI - NPN/NSPN - 5
2.5 GSA has identified
- 58 Countries and Territories with Private Network Deployments based on LTE or 5G, or where
Private Network Spectrum Licences suitable for LTE or 5G have been assigned.
- There are Private Mobile Network Installations in various Off-shore Locations serving
the Oil and Gas Industries, as well as on Ships.
- 656 Organisations known to be deploying LTE or 5G Private Mobile Networks.
Since the last update of this report in November 2021, some organisations have been removed from the Data Base
and this Analysis, owing to a lack of evidence that they met the definition criteria. These examples may be added
again in the future.
16. https://enterpriseiotinsights.com/20210831/chan
nels/news/the-failure-of-private-5g-another-telco-
bungle-or-just-industrial-inertia-is-the-window-
really-closing
2. Market Definition and Deployments of "Private 5G" PNI - NPN/NSPN - 7
The ‘Failure’ of Private 5G – another Telco bungle, or just Industrial Inertia? (Is the Window really
Closing?) August 31, 2021
Most "Vertical’ Licences", so far, remain attached to PoCs.
So the early interest is from ‘Industrial Leaders’, often with vested interests in Selling
solutions Over-the-Top, to kick the tyres on Private 5G.
And the Number of fully-fledged deployments are limited,
if you look at the Names of the Licensees, more than half (50%) of them are
strictly speaking Non-Commercial.
Either,
1. they are Research and / or Proofs, as you rightly mention, or [else]
2. they are System-Integrator (SI) Deployments – [all of which] want to Test and
Showcase 5G Solutions they are looking to provide to clients.
The question then becomes what level of PNI-NPN will emerge as the most successful.”
17. https://enterpriseiotinsights.com/20210831/chan
nels/news/the-failure-of-private-5g-another-telco-
bungle-or-just-industrial-inertia-is-the-window-
really-closing
2. Market Definition and Deployments of "Private 5G" PNI - NPN/NSPN - 8
The ‘Failure’ of Private 5G – another Telco bungle, or just Industrial Inertia? (Is the Window really Closing?) August 31, 2021
There are 1,000-plus Private Networks deployments globally, and that most of these are in
China.
“in China, the Industry assumes there are several 100 Private Network deployments,
but only 40 are fully Publicly disclosed” – …. the number of deployments in China is higher;
Most deployments in China use this Public-Private (Non-Public) Network Integration (PNI-NPN)
Model - where the UPF runs off the Public Network, allied with Local-Area Private Radios.
Comparing success in Germany / Europe with China is difficult – because China is so heavily
reliant on Carriers pushing hard. What do you make of this?
18. https://enterpriseiotinsights.com/2021
0820/channels/news/alarming-private-
5g-window-is-closing-to-telcos-almost-
before-it-opens
2. Market Definition and Deployments of "Private 5G" PNI - NPN/NSPN - 9
"Alarming" - Private 5G Window is closing to Telcos, almost before it opens. August 20, 2021
1. Germany’s interest in Private Networks is fading,” says ABI. “[And]
other European countries are lagging far behind.”
The basis for their crisis is that ‘Vertical’ spectrum applications, available to
enterprises on 10-year deals for the same outlay as a decent phone contract,
have slowed in Germany, from around 80 in the 1st half of 2020 (40 per
Quarter on average) to “only” 20 in the 2nd Quarter of 2021 – representing an
compound reversal of about 50% in the period.
….the German regulator, has so far issued 146 licences for local-
area 5G in Germany.
It puts the number of Publicly-disclosed Private Network Deployments at
290, globally, including 40-odd official deployments in China.
19. https://enterpriseiotinsights.com/2021
0820/channels/news/alarming-
private-5g-window-is-closing-to-
telcos-almost-before-it-opens
2. Market Definition and Deployments of "Private 5G" PNI - NPN/NSPN - 10
2. The other concern for ABI is that in Europe, headlined by activity in Germany,
the Private 5G Agenda is being driven by Vendor Sales Strategies, rather than by Enterprise
Transformation Strategies.
Most deployments in Germany are Sales-driven; only a few are really used to
enhance enterprise workflows and operations.
“In China, almost all Deployments are for Real-Life Enterprise Use-Cases (UCs), motivated by
Demand.
3. In Germany, most Private Networks are [sold] by System Integrators (SI) or Factory
Automation Vendors to showcase 5G [and to] integrate their Product offerings.”
“The Telco Industry must realize that the Value proposition for Enterprise 5G does not lie in the
Technology, but in the Applications it enables.
No Enterprise cares about whether they deploy 4G or 5G, as long as it solves their pain points.”
20. 2. Market Definition and Deployments of "Private 5G" PNI - NPN/NSPN - 11
Enterprises don’t understand the Tech or ROI – Ford on what to fix with Private 5G May 25, 2021
But speaking plainly at today’s Private Networks Forum event, Automotive Manufacturer Ford
said the onus is on the two (2) sides to meet halfway, and suggested:
"Industrialists, in fact, are pretty clueless about Industrial 5G in general"
Chris White, electrification manager for Ford’s European Business, commented:
“Our understanding was really poor at the start.
We’ve been in this a year, working with Vodafone, and we have built-up
that understanding.
But… that understanding about [industrial 5G] is very poor outside of
the Telecoms world.”
21. Ref. Demonetizing Everything. A post Capitalism World, Peter Diamandis, Sngularity Univ Summit, 2017
2. Market Definition and Deployments of "Private 5G" PNI - NPN/NSPN - 12
Enterprises don’t understand the Tech or ROI – Ford on what to fix with Private 5G, May 25, 2021
Sharing a panel with Ericsson, Mavenir, and Radisys,
Chris White ran through some of the preceding topics in the panel session at Private Networks Forum:
“Standalone (SA), Non-Standalone (NSA), all the latest 3GPP Releases:
1. [There is a lack of understanding about] all these things we have talked
about, and
2. What they mean for Enterprises.”
He added: “Helping Enterprises with that Knowledge is really important.”
At the same time, White warned that:
5G is a "Means-to-an-End": the subtext is the Telecoms community is inclined
to present it as the Solution, instead – as per the criticism, referenced above,
levelled at the sector by enterprises.
“5G is just an Enabler: There is no Business Case for 5G,” he said.
22. Access to Services in PNI - NPN/SNPN Configurations
3. Examples of PNI-NPN/SNPN Standard defined Configurations and
Capabilities (re.: KIs/UCs & Solutions)
Ref.: 3GPP, Rel. 17
23. 3. 3GPP Definition of PNI - NPN/SNPN with Diagrams - 2
Ref.: 3GPP, Rel. 17
43. NPN/SNPN Mapping Solutions to Key Issues - 3GPP Rel. 17
Key Issues
Nr
Solutions
#1
Enhancements to Support SNPN
along with Credentials owned by
an Entity separate from the SNPN
#2:
NPN support for Video, Imaging
and Audio for Professional
Applications (VIAPA)
#3
Support of IMS Voice and
Emergency Services for
SNPN
#4
UE Onboarding and Remote
Provisioning
#5
Support for Equivalent SNPNs
#6
Support of Non 3GPP
Access for NPN
Services
1 X X
2 X X
3 X
4 X
5 X
6 X
7 X
8 X
9 X
10 X
11 X
12 X
13 X
14 X
15 X
16 X
17 X
18 X
19 X
20 X
21 X
22 X
23 X
24 X
25 X
26 X
27 X
28 X
29 X
30 X
31 X
32 X
33 X
34 X
35 X
36 X
37 X
38 X
39 X
40 X
41 X
42 X
43 X
44 X
45 X
46 X
47 X
48 X
49 X
50 X
51 X
52 X
53 X
54 X
55 X
56 X Ref.: 3GPP, Rel. 17
44. Slicing Enhanced Access and Support Mapping Configurations to Use Cases
Enhanced Access & Support for Network Slice Configurations to UCs
Nr
Use Cases (UCs)
#1
When there is a Restriction of Network
Slice (SST) to e.g., certain Frequency
Bands/Sub Bands, RATs, Geographical
Areas, Networks & Applications
#2
When a UE has a Subscription to Multiple
Network Slices & these Network Slices
are deployed for e.g., Different Frequency
Bands/Sub Bands, RATs, Geographical
Area & Applications
#3
When there is a Preference or
Prioritization for a Network Slice
(SST) over other Network Slices
(SST) e.g. when there are
conflicting constraints on Network
Slice (SST) Availability.
1
2
3
4
5
6
7
8
9
10
11
12
13
Ref.: 3GPP, Rel. 17 & 18
45. IIoT Solutions to IIoT Key Issues
Mapping of IIoT Solutions to IIoT Key Issues (Kis)
Nr
Key
Issues
(KIs)
#1
Uplink Time
Synchronization
n
#2
UE-UE TSC
Communication
#3A
Exposure of TSC
Services: Exposure of
Deterministic QoS
#3B
Exposure of TSC
Services Exposure of
Time Synchronization
#4
Supporting the fully
Distributed
Configuration Model
for TSN
#5
Use of Survival
Time for
Deterministic
Applications in 5GS
1 X
2 X
3 X
4 X
5 X
6 X
7 X
8 X
9 X
10 X
11 X
12 X
13 X
14 X
15 X
16 x
17 X
18 X x
19 X
20 X
21 X
22 X
23 X
24 x
Ref.: 3GPP, Rel. 17
46. 3GPP 5G UE New Services Enablement Clients (UAC - Unified Access Control for Access Identities & Access Categories
Fig.: NSCE-C
+
+
+ +
Ref.: 3GPP, Rel. 17
47. 3GPP 5G UE New Services Enablement Clients (UAC - Unified Access Control for Access Identities & Access Categories
Ref.: 3GPP, Rel. 18
48. 5G NFs SFC - Service Function Chaining
The study targets the use of Traffic Steering Concept, e.g. defined by 3GPP
(FMSS) and SFC mechanisms defined in IETF when applicable.
Especially the study aims at reusing User Plane (UP) mechanisms
(e.g. VXLAN, NSH, GENEVE, GRE, VLAN, etc.) defined at IETF to support SFC,
as applicable.
Solutions shall build on the 5G System Architectural Principles including Flexibility
and Modularity for newly introduced functionalities.
- Service path (i.e. for Traffic handled by the Service Functions (SFs)) is traversed
over N6 after PSA UPF(s) in 5G network.
Currently, the SMF may be configured with the Traffic Steering policy related to the
mechanism enabling traffic steering to the N6-LAN, DN and/or DNAIs associated
with N6 traffic routing requirements provided by the AF.
- UPF with SFC capabilities need to support flexible SFC configuration for a PDU
session that requires different SFC processing for different Applications.
For allowing an AF, e.g. a 3rd Party AF, to request predefined SFC for Traffic
Flow(s), etc. (when the AF belongs to a 3rd Party, this is based on Service Level
Agreement (SLA) with the 3rd Party), this key issue will study Solution on:
Ref.: 3GPP, Rel. 18
50. Stand-alone (SA) - NR-U (NR-
Unlicensed)
connected to 5GC.
This Scenario targets NPN
- In contrast to LTE, which only supports License-Assisted-Access (LAA) operation in
Un-licensed Spectrum,
- NR supports both LAA & Stand-alone (SA) Un-licensed Operation, see Figure 310.
In the case of LAA, a NR carrier in Unlicensed Spectrum is always operating jointly with a
carrier in Licensed Spectrum, with the Carrier in Licensed Spectrum used for initial access
and Mobility.
- The licensed carrier can be an NR carrier, but it can also be an LTE carrier. Dual
connectivity is used in case of the licensed carrier using LTE. If the licensed carrier is
using NR, either dual connectivity or carrier aggregation can be used between the
licensed and unlicensed carrier.
In case of SA Operation, an NR carrier in Un-licensed Spectrum operates without support
of a Licensed Carrier.
Thus, initial access and mobility are handled entirely using Unlicensed spectra.
- In 3GPP Rel. 16, NR was extended
to support operation also in Un-
licensed Spectra, with focus on the
5 GHz (5150-5925 GHz) & 6 GHz
(5925 – 7150 GHz) bands (Figure
3.9).
- The 5 GHz band is used by existing
Technologies such as Wi-Fi & LTE-
based LAA and it was a
requirement, for the design of NR-
U, or NR in Un-licensed spectrum,
Ref.: 5GA 2021
52. Slicing Enhanced Access and Support Mapping Configurations to Use Cases
Enhanced Access & Support for Network Slice Configurations to UCs
Nr
Use Cases (UCs)
#1
When there is a Restriction of Network
Slice (SST) to e.g., certain Frequency
Bands/Sub Bands, RATs, Geographical
Areas, Networks & Applications
#2 When
a UE has a Subscription to Multiple
Network Slices & these Network Slices are
deployed for e.g., Different Frequency
Bands/Sub Bands, RATs, Geographical
Area & Applications
#3 When
there is a Preference or
Prioritization for a Network Slice
(SST) over other Network Slices
(SST) e.g. when there are
conflicting constraints on Network
Slice (SST) Availability.
1
2
3
4
5
6
7
8
9
10
11
12
13
Ref.: 3GPP, Rel. 18
57. 5G ACT & ACR (Application Context Transfer & Application Context Relocation for Service Continutiy T-EAS & S-EAS
Ref.: 3GPP, Rel. 17
58. Application Function (AF) influence on Traffic Routing
The content of this clause applies to :
- Non-Roaming and to
- LBO deployments
i.e. to cases where the involved entities (AF, PCF, SMF, UPF) belong
to
- the Serving PLMN or
- AF belongs to a 3rd Party with which the Serving PLMN has an
agreement.
AF influence on traffic routing does not apply in the case of Home
Routed deployments. PCF shall not apply AF requests to influence
traffic routing to PDU Sessions established in Home Routed mode.
An AF may send requests to influence SMF routing decisions for
traffic of PDU Session.
The AF requests may influence UPF (re)selection and (I-)SMF
(re)selection and allow routeing user traffic to a local access to a
Data Network (identified by a DNAI).
The AF may issue requests on behalf of applications not owned by
the PLMN serving the UE.
Ref.3GPP TS 23 501 5G System Architect., Rel., 17, Dec 2021: 132 - 133
Ref.: 3GPP, Rel. 17
60. PALS The Application Layer Approaches require 5G Network to expose
Network Capabilities for Localized Services
As shown in the Figure, the e-Agreement is established among Service
Operators, e.g. SP-A, SP-B, and
SP-C have no SLAs in place for the Services provided by SP-A’s Hosting
Network - A.
The SP-A Operator creates an e-Agreement which provides the Localized
Service Configuration.
The SP-B and SP-C Operators can subscribe this Localized Service with
required Service Policies for their UEs.
The SP-B and SP-C can then configure their UEs for Localized Service.
Based on the e-Agreement, the Hosting Network can be configured with
Localized Service at a specific time & location for its subscribers (other
Network Operator), e.g. Localized Service Policies of Time, Location,
Network-AAccess Parameters, including Spectrum, Access Technologies
(3GPP or non-3GPP), Network Slice, Charging Policies, and Subscriber’s
Network Policies for Authentication, and Routing.
Ref.: 3GPP, Rel. 17 & 18
61. 5G NFs SFC - Service Function Chaining
Solutions shall build on the 5G System Architectural Principles including Flexibility
and Modularity for newly introduced functionalities (3GPP defined FMSS).
- Service path (i.e. for Traffic handled by the Service Functions (SFs)) is traversed
over N6 after PSA UPF(s) in 5G network.
Currently, the SMF may be configured with the Traffic Steering policy related to the
mechanism enabling traffic steering to the N6-LAN, DN and/or DNAIs associated
with N6 traffic routing requirements provided by the AF.
- UPF with SFC capabilities need to support flexible SFC
configuration for a PDU session that requires different
SFC processing for different Applications.
For allowing an AF, e.g. a 3rd Party AF, to request
predefined SFC for Traffic Flow(s), etc. (when the AF
belongs to a 3rd Party, this is based on Service Level
Agreement (SLA) with the 3rd Party), this key issue will
study Solution on:
Ref.: 3GPP, Rel. 17 & 18
62. PALS Interworking between Networks Operators and Application Providers for Localized Services
Ref.: 3GPP, Rel. 17 & 18
63. PALS Interworking between Networks Operators and Application Providers for Localized Services
Ref.: 3GPP, Rel. 17 & 18
75. NPN/SNPN Mapping Solutions to Key Issues - 3GPP Rel. 17
Key Issues
Nr
Solutions
#1
Enhancements to Support SNPN
along with Credentials owned by
an Entity separate from the SNPN
#2:
NPN support for Video, Imaging
and Audio for Professional
Applications (VIAPA)
#3
Support of IMS Voice and
Emergency Services for
SNPN
#4
UE Onboarding and Remote
Provisioning
#5
Support for Equivalent SNPNs
#6
Support of Non 3GPP
Access for NPN
Services
1 X X
2 X X
3 X
4 X
5 X
6 X
7 X
8 X
9 X
10 X
11 X
12 X
13 X
14 X
15 X
16 X
17 X
18 X
19 X
20 X
21 X
22 X
23 X
24 X
25 X
26 X
27 X
28 X
29 X
30 X
31 X
32 X
33 X
34 X
35 X
36 X
37 X
38 X
39 X
40 X
41 X
42 X
43 X
44 X
45 X
46 X
47 X
48 X
49 X
50 X
51 X
52 X
53 X
54 X
55 X
56 X
Ref.: 3GPP, Rel. 17