Home | Reports | Technical Documents | Tech-Blog | One-Shot Gallery | Korea ICT News | Korea Communication Market Data | List of Contributors | Become a Contributor |    
 
 
Section 5G 4G LTE C-RAN/Fronthaul Gigabit Internet IPTV/Video Streaming IoT SDN/NFV Wi-Fi KT SK Telecom LG U+ Network Protocol Samsung   Korean Vendors
 
Private 5G | Edge Netmanias Private 5G Analysis KT SK Telecom Verizon AT&T Vodafone DT Telefonica China Mobile Optage NEC Fujitsu Microsoft AWS    
    HFR Ericsson Nokia Huawei Samsung Mavenir Affirmed Metaswitch Athonet Altiostar Airspan Kyocera Apresia    
CHANNELS     HFR Private 5G Solution (my5G)       my5G Solution Components       my5G Key Features        my5G Resources          
NETMANIAS
TECH-BLOG
Online viewer:
Layering is a well-known strategy for security. By using layers, we increase the difficulty of penetration and reduce the impact of a failure at any given layer. Here are some guidelines for applying layered security to universal customer premises equipment (uCPE) deployments. The uCPE layers inc...
Date: 05/14/2018
Author: Prayson Pate @ ADVA
15,692
  
 0
Online viewer:
So finally the Frenzy of 5G Networks and how they will bridge the gaps between different industries and societies seems finally come to materialization .As most of the Tier1 Operators are working to build the Use cases that will support for early launch and market capture catalyst for early mover...
Date: 03/07/2018
Author: Saad Sheikh @ Saudi Telecom Company
Tags: 5G, Security
20,202
  
 1
Online viewer:
In this brief article I will touch on 3GPP recent achievements regarding 5G followed by high level discussion on migration associated security aspects and finally details of 3GPP specifications on Non-Stand-Alone or 4G-5G Dual Connectivity.
Date: 02/22/2018
Author: Anand R. Prasad @ 3GPP/NEC
Tags: 5G, Security
16,122
  
 0
Online viewer:
Friday, 22 September, 2017, I gave a talk at the IEEE 5G Summit held at Kogakuin University in Tokyo. My talk was about 5G security reality check where I covered 3GPP standardization status, solutions that are already in specifications and several other aspects necessary to make 5G secure. I wil...
Date: 11/15/2017
Author: Anand R. Prasad @ 3GPP/NEC
Tags: 5G, Security
16,069
  
 0
Online viewer:
In a previous article I had pleaded for the identification of the DTE (the computer, the smartphone or other connected object), not the DCE (modem) or NIC (Network Interface Card). A digital identity for the IoT, which we started calling the "telecoin" here at Nokia. Telecoins can be mined in a f...
Date: 11/02/2017
Author: Thierry Van de Velde @ Nokia Networks
19,675
  
 1
Online viewer:
My observation after the two days was that there are several security solutions around but vehicle (connected or not) industry has still a lot to work on. As vehicles get more and more connected, vehicle industry will face issues beyond their normal comfort zone. The industry will have to take se...
Date: 10/04/2017
Author: Anand R. Prasad @ 3GPP/NEC
17,605
  
 1
Online viewer:
Going by a recent BI Intelligence report, there will be close to 35 billion ‘connected devices’ in active use by the end of this decade – with business being the biggest sector to use this technology. However, in the rush to come up with new and innovative IoT tools, platforms and gateways – the...
Date: 07/24/2017
Author: Romit Atta @ Teknowledge Mobile Studio
Tags: IoT, Security
18,171
  
 5
Online viewer:
Most of SD-WAN players focus on site-to-site links (through MPLS or VPNs) or site-to-cloud (mainly AWS and Azure). This means that this devices will be exposed on internet. Are they strong enough to protect themselves from botnets, scripts kiddies or some other basic attaks? Most of SD-WAN manufa...
Date: 07/03/2017
Author: Michel Boulay @ FMlogistic
21,831
  
 7
Online viewer:
There are several opinion out there in security, some referring to a vehicle as a Internet of things (IOT) device but vehicle should not be bunched in the IOT lot. Vehicle is a collection of IOT devices with different services and deserves a different angle for security considerations.
Date: 05/15/2017
Author: Anand R. Prasad @ 3GPP/NEC
16,483
  
 1
Online viewer:
Microsegmentation allows a flexible and optimized way of providing security services to the places where traditional security technologies can’t reach or don’t scale. Microsegmentation can be equally applied to Virtual as well as Bare Metal workloads or Overlay / Underlay Networks.
Date: 05/01/2017
Author: Ari Chakrabarti @ Financial Institution Consulting
15,217
  
 0
1
         
   

We are pleased to share with you all interesting articles contributed by industrial experts

 

List of Contributors

 

Become a Contributor

 
         
         
   
 

KT Private 5G: Multi-Slice and Multi-MEC for an Enterprise

     
     
     
     
     

 

   
 

KT 5G and 10Giga Network Architecture

     
     
     
     
     

 

 

View All (838)
4.5G (1) 5G (96) AI (6) AR (1) ARP (3) AT&T (1) Akamai (1) Authentication (5) Big Data (2) Blockchain (3) C-RAN/Fronthaul (18) CDN (4) CPRI (4) Carrier Ethernet (3) China (1) China Mobile (2) Cisco (1) Cloud (5) CoMP (6) Connected Car (4) DHCP (5) EDGE (1) Edge Computing (1) Ericsson (2) FTTH (6) GSLB (1) GiGAtopia (2) Gigabit Internet (19) Google (7) Google Global Cache (3) HLS (5) HSDPA (2) HTTP Adaptive Streaming (5) Handover (1) Huawei (1) IEEE 802.1 (1) IP Routing (7) IPTV (21) IoST (3) IoT (55) KT (43) Korea (19) Korea ICT Market (1) Korea ICT Service (13) Korea ICT Vendor (1) LG U+ (18) LSC (1) LTE (78) LTE-A (16) LTE-B (1) LTE-H (2) LTE-M (3) LTE-U (4) LoRa (7) MEC (4) MPLS (2) MPTCP (3) MWC 2015 (8) NB-IoT (6) Netflix (2) Network Protocol (21) Network Slice (1) Network Slicing (4) New Radio (9) Nokia (1) OSPF (2) OTT (3) PCRF (1) Platform (2) Private 5G (5) QoS (3) RCS (4) Roaming (1) SD-WAN (17) SDN/NFV (71) SIM (1) SK Broadband (2) SK Telecom (35) Samsung (5) Security (16) Self-Driving (1) Small Cell (2) Spectrum Sharing (2) Switching (6) TAU (2) UHD (5) VR (2) Video Streaming (12) VoLTE (8) VoWiFi (2) Wi-Fi (31) YouTube (6) blockchain (1) eICIC (1) eMBMS (1) iBeacon (1) security (1) telecoin (1) uCPE (2)

 

     
         
     

 

     
     

Subscribe FREE

Currently, 49,000+ subscribed to Netmanias.

  • You can get Netmanias Newsletter

  • You can download all netmanias' contents in pdf file