telecommunications Archives - TechReviewsCorner Corner For All Technology News & Updates Tue, 05 Jul 2022 07:30:55 +0000 en-US hourly 1 https://wordpress.org/?v=6.3.2 https://www.techreviewscorner.com/wp-content/uploads/2020/05/TRC3.jpg telecommunications Archives - TechReviewsCorner 32 32 Reducing The Complexity Of 5G Networks https://www.techreviewscorner.com/reducing-the-complexity-of-5g-networks/ https://www.techreviewscorner.com/reducing-the-complexity-of-5g-networks/#respond Tue, 05 Jul 2022 07:30:45 +0000 https://www.techreviewscorner.com/?p=4169 After a slow start, the implementation processes of AI-in-5G platforms are picking up speed. The company aims to provide customers and partners with new applications and services as quickly as possible so that the introduction of AI in companies can succeed in 2022. Why private 5G networks have only been rolled out slowly so far […]

The post Reducing The Complexity Of 5G Networks appeared first on TechReviewsCorner.

]]>
After a slow start, the implementation processes of AI-in-5G platforms are picking up speed. The company aims to provide customers and partners with new applications and services as quickly as possible so that the introduction of AI in companies can succeed in 2022.

  • Why private 5G networks have only been rolled out slowly so far
  • Why AI is about to break through in 5G platforms
  • Which factors are now accelerating the AI-on-5G expansion
  • Which application scenarios are conceivable for AI/5G-based platforms

In 2019, the reasons for adopting 5G technology in enterprises seemed promising: high-speed connections connecting hundreds of end devices with better latency and a higher security standard compared to 4G LTE. Added to this was the prospect of additional revenue from new applications and services. With a view to 2022, network operators are now realizing in retrospect that the implementation was and is anything but easy.

Aside from pandemic-related restrictions and the associated remote working, enterprises have been slow to roll out private 5G networks due to the high cost and complexity of implementation. Compared to setting up a WLAN, where IT pros are well-versed in setting up the networks on company premises and warehouses, configuring and optimizing cellular networks takes much more work. The setup process has traditionally relied on a few companies and purpose-built devices.

Another reason why the introduction of the 5G standard in companies has been slow so far is that financial resources are reluctant to be made available, especially in the initial phase of a technology, even if it can be used to develop new applications and services that promise higher returns.

Accelerating Factors For AI On 5G

The good news is that network equipment manufacturers, software, and cloud service providers are now paying more attention. AI-on-5G (AI in 5G platforms) is poised for a significant breakthrough this year. One of the reasons for this is that companies have already received attractive offers for software-defined solutions that drastically reduce their costs and hybrid cloud-on-premises installations or innovative pay-as-you-go models.

This is confirmed by a PWC survey of global companies in 2021: Around 52 percent of companies have pushed ahead with their plans to implement AI due to the pandemic. Eighty-six percent indicated that AI would become the new mainstream technology in their company in the coming years.

Three essential factors, in particular, accelerate the deployment of AI-on-5G:

Flexible, More Efficient Equipment

AI-on-5G creates a software-defined ecosystem that can use off-the-shelf servers that do not require telecom-specific, bespoke hardware. These servers are a good fit because they are compatible with existing IT management and orchestration tools, and in addition, they can be used for other IT applications. The combination of AI and 5G technologies on standard hardware and software orchestration stacks will play a crucial role in developing numerous new applications and pave the way for further new business prospects for consumers and companies.

Inexpensive and efficient AI-on-5G platforms help companies address many of today’s challenges. With their flexibility and accessibility, they contribute to a democratization of the market, similar to the early days of PCs or Wi-Fi.

The companies can determine the configuration of the servers themselves. For example, they can add industrial automation software, intelligent video analytics, voice technology, face recognition, and a software-defined 3GPP-compliant 5G vRAN VNF.

Hybrid Deployment

Models Another critical factor is that the 5G network workload and AI/ML applications will be hosted on an on-premises server, in the cloud, or in a hybrid cloud solution. Additionally, organizations can maintain application and data sovereignty or neutrality by using corporate-owned devices, telco cloud, or hyperscale cloud services.

To ensure this level of flexibility, the 5G software-defined stack is ideally run as a container, allowing it to be treated like a native cloud application. So the 5G stack doesn’t need bespoke hardware or custom silicon-based accelerators.

Convergence of AI And OT Solutions Emerging

Edge AI applications are driving the growth of intelligent spaces, including smart factories. These factories use cameras and other sensors to inspect and predictively maintain machines. However, discovering a non-perfect operating condition is only the first step; after detecting the error, appropriate action must be taken to fix it. The process requires, on the one hand, a connection between the AI ​​and software-defined 5G applications running on the IT equipment and, on the other hand, the monitoring and control of the machines, which traditionally run on separate OT systems that comprise the assembly lines, robotic arms or managed placement machines.

The integration of IT and OT systems is crucial to implementing the concept of factory automation over a 5G network and realizing the benefits of 5G. This year is expected to see greater integration of AI and traditional OT management solutions that will simplify the adoption of edge AI in industrial environments.

The Promise Becomes a Reality.

The promise that 5G will unlock new possibilities for edge computing is more tangible today than ever. Key benefits of 5G include network slicing, which allows dedicated bandwidth to specific applications, ultra-low latency in non-wired environments, increased security, better isolation, and increased mobility and range.

AI-on-5G will unlock new AI use cases. These include Industry 4.0 applications such as plant automation, intelligent robots, in-line monitoring and inspection, automotive systems such as toll roads and vehicle telemetry systems, and intelligent spaces in retail, cities, and the supply chain. The ease of deployment and management of these software-defined systems is a crucial requirement for their adoption.

Also Read: The Fifth-Generation Technology – 5G Expands In The World

The post Reducing The Complexity Of 5G Networks appeared first on TechReviewsCorner.

]]>
https://www.techreviewscorner.com/reducing-the-complexity-of-5g-networks/feed/ 0
The State Of Mobile Telecommunications Security https://www.techreviewscorner.com/mobile-telecommunications-security/ https://www.techreviewscorner.com/mobile-telecommunications-security/#respond Thu, 18 Mar 2021 04:34:55 +0000 https://www.techreviewscorner.com/?p=1811 The Report has released the Mobile Telecommunications Security Landscape Report with an overview of significant security issues. 2020 saw a number of changes in the security landscape, while traditional threat actors and areas continue to be present and pressure on networks remains. SOFTWARE AND VIRTUALIZATION There are many industry initiatives that drive more open architectures […]

The post The State Of Mobile Telecommunications Security appeared first on TechReviewsCorner.

]]>
The Report has released the Mobile Telecommunications Security Landscape Report with an overview of significant security issues. 2020 saw a number of changes in the security landscape, while traditional threat actors and areas continue to be present and pressure on networks remains.

SOFTWARE AND VIRTUALIZATION

There are many industry initiatives that drive more open architectures and virtualized telecommunications infrastructures, such as TIP, O-RAN Alliance, Linux Networking Foundation, and the Open Networking Forum. The telecommunications industry uses open-source community software in a number of architectural deployments.

The software implements the functionality of the unit. The code may be proprietary and contain open source components and may contain commercially supported open-source virtualization software to enable the interface between the code and the supporting open hardware or cloud infrastructure. Different architectural decisions result in variations in the levels of abstraction and separation between workloads within virtualization fabrics.

Security must be considered when selecting the network and virtualization software layers. Therefore, strong code support is essential to ensure that malware and compromised code are fixed before attackers can exploit them.

CYBER ​​AND OPERATIONAL SECURITY

Several attack vectors are presented, each requiring strong security controls and processes to minimize the threat of an attack:

  • Phishing attacks: Well-designed and stylish phishing attacks continue to have a finite success rate in penetrating perimeter defenses.
  • Malicious Insider / Compromised Access: Similarly, internal controls, least privileges, and strong authentication make it harder for a malicious insider to gain traction.
  • Attack on managed service providers: Remote compromise of a managed service provider offers a potential attack vector.
  • Attack on the Internet and DDOS interconnection/roaming/signaling: The exploitation of control signaling is a well-known attack vector that is widely documented and receives significant coverage.
  • Exposed routers and servers: A network operator will have a significant heritage of vendor equipment, routers, and servers. It is important to know the equipment inventory well to be able to manage and protect it.
  • Attack on devices: With increasing access bandwidth and a number of malware attacks on devices, protection against device-based network attacks on the network should be considered.
  • Supply chain where equipment or software experiences interference in the supply or deployment process.

SUPPLY CHAIN

The supply chain can be broken down into a number of distinct but related areas: the components of a network that come together to provide a resilient operational service, where those components are sourced, and the parties involved in making products and services that contribute to the preservation and maintenance of a network.

The GSMA recommends the following in relation to supply chain security:

  • Understand with whom you do business.
  • Trace and evaluate the criticality of any component or service offering within the supply chain.
  • Prepare business continuity plans that take into account the elimination of critical suppliers.
  • Apply the range of security considerations identified in the GSMA White Paper.
  • Consider testing open network solutions to reduce the risk of new vendor selection.
  • Work with local legislators and regulators.
  • Participate in and support the development of international standards.

CLOUD SECURITY

In the era of 5G, in which Mobile Edge Computing (MEC), big data, and IoT devices become synonymous with mobile network operations, the volumes of data created, stored, and processed to meet the demands of the business increase, and as such, so does the need for a free flow of data.

The personal data of customers of mobile phone operators remains a prized target for would-be attackers. Customer data can be exploited to target individuals directly through phishing, malware, or other attacks or indirectly through the sale of data to third parties.

Cloud infrastructure is increasingly being deployed on mobile networks to take advantage of a lower infrastructure cost base, benefit from economies of scale, and increase flexibility. Technical solutions range from a private cloud, public cloud, and even hybrid cloud.

DEVICE AND IOT SECURITY

The number of devices connected to mobile networks exceeds the world population and the number of unique subscribers is 65% of the world population. With the rapid adoption of IoT devices, connections are expected to exceed 25 billion by 2025.

Devices are becoming more powerful and feature-rich, and will increasingly depend on network features and functions in the 5G era. There are more than 5 billion unique subscribers to the mobile network and the use of mobile devices represents a large volume of Internet traffic. Consumers hope to be able to run their lives from their devices, but growing awareness of inappropriate privacy controls and unauthorized use of data is lowering consumer confidence.

SIGNALING AND INTERCONNECTION

With the arrival of 5G, important advances have been made in terms of interconnection security, for which new controls have been defined between networks, such as the Security Edge Protection Proxy (SEPP). SEPP is a new network function that protects the edge of the home network, acting as a security gateway in the interconnections between the home network and visited networks.

The SEPP is designed to:

  • Provide application layer security and protect it.
  • Provide end-to-end authentication.
  • Offer key management mechanisms to establish cryptographic keys.
  • Perform filtering and monitoring of messages.

5G SECURITY

5G represents an opportunity for the mobile telephony industry to improve the security of networks and services, both due to its inherent design in network functions and due to its deployment strategies. New authentication capabilities, greater protection of subscriber identity, and additional security mechanisms will lead to significant security improvements over previous generations.

Much attention has been paid to identifying the main threats in 5G networks. There are a number of functions identified as critically sensitive. These include: virtualization infrastructure, controllers, orchestrators, Internet gateways, network outage, mobile edge computing, routing and switching of IP traffic at the core, database functions, authentication, access control and other security features

SECURITY SKILLS SHORTAGE

The shortage of specialized personnel in mobile network security has made it difficult for network operators to create and maintain their own knowledge. The breadth of knowledge that will be needed in 5G-era networks is likely to be much broader (including Intelligence Artificial, big data, IT, Cloud) and will also require the fundamentals of security skills in the traditional core of telecommunications.

To limit the impact of skills shortages, the industry should:

  • Model and define current and future threats.
  • Consider the advantage it represents for the development of competencies.
  • Define formal and informal training mechanisms.
  • Have a structured skills management capacity.
  • Annually reassess cybersecurity functions.
  • Automate whenever possible.

The post The State Of Mobile Telecommunications Security appeared first on TechReviewsCorner.

]]>
https://www.techreviewscorner.com/mobile-telecommunications-security/feed/ 0