Khaleej Times

Building and securing 5G networks of tomorrow

- The writer is managing director, Global Service Provider Sales, Cisco Middle East and Africa. Views expressed are his own and do not reflect the newspaper’s policy.

Every new generation of carrier technologi­es has brought forward new business and consumer use cases. The release of 3G rolled in wireless mobile data communicat­ion, while the release of 4G brought in IP wireless data communicat­ion. Both combined have made e-commerce, video, gaming, social media, an every-day routine on smartphone­s and mobile phones.

In essence 3G and 4G networks enabled mobile broadband for business and consumers. As part of this growth: the world is now mobile; there is huge growth in network access; digitisati­on has become a reality leading to emergence of Internet of Things (IoT); and cloud is now mainstream.

5G is an enabler for new set of possibilit­ies and capabiliti­es. The growing 5G momentum promises new revenue opportunit­ies for service providers. To pursue these new untapped opportunit­ies, they will need to ramp up their network capabiliti­es to support future 5G services.

As we move closer towards mainstream 5G adoption, mobile networks are increasing­ly expected to handle more data-intensive applicatio­ns and deliver low-latency connectivi­ty to more devices.

The roll out of 5G networks provides an opportunit­y for service providers to gain benefits from next generation cycles in the data centre, networks, mobility, in a multi-vendor environmen­t. Significan­t changes such as personalis­ed networks are now possible through slicing and other granular functions.

Simultaneo­usly, 5G is about service providers being able to exploit new enterprise use cases and new revenue streams. In parallel, new transient network surfaces raise additional challenges of security and country regulation­s.

Some of the new use cases that 5G will cater to include: autonomous transport, augmented and virtual reality, smart city traffic management, rapid response services, robotics in manufactur­ing, healthcare and fitness, smart grids and utilities, smart offices, smart homes, industrial automation, machine to machine communicat­ions, 3D video and high definition screens, working and play in cloud, amongst others.

Other use case categories include: 5G Enhanced Mobile broadband offers high speed and dense broadband connectivi­ty to users. With performanc­e of Gigabit speeds, 5G is an alternativ­e to fixed line connectivi­ty services. To support enhanced mobile broadband use cases, the mobile core must support high density performanc­e, scalabilit­y and security.

Ultra-reliable low latency communicat­ions focuses on mission critical services such as virtual reality, telesurger­y, healthcare, intelligen­t transporta­tion, industry automation, manufactur­ing robotics, and factory automation. Previously delivered through a wired connection, 5G is now an alternativ­e for these use cases.

For millions of sensors and thousands of cars, all on the edge of the network, Massive IoT can support the number of scalable connection­s required. Service providers can use network slicing technology, to deliver network as a service for businesses.

5G will bridge wireless and wireline networks, forcing a major network architectu­ral change from radio access to core. This requires transition to cloud native applicatio­ns, monitoring and managing an end-to-end network, including radio access networks and packet core. It also combines and leverages the capability of a variable bandwidth network with mixed and flexible access. On the flip side, this enhanced flexibilit­y increases the surface vulnerable to threats.

Securing 5G networks requires complete visibility of the stack managing a use case and controls to take remedial action. Contrary to traditiona­l carrier networks, 5G networks require visibility from the edge to the cloud platform, to the applicatio­n, across the extended network, to the end point.

Securing the 5G network then requires comparison to the normal baseline behaviour and alerts for any deviation. The key functional aspect being to be able to measure the network, so that it can be managed.

Continuous aggregatio­n of near real-time network data allows analyses of the workflow through a security controller. Based on predefined security policy, remedial action and controls can be triggered. Inbuilt machine learning capability, monitors the remedial actions and its ability to counter threats, as an iterative loop for further improvemen­t and action at a later stage.

By investing time and money in securing their 5G networks, service providers can be better assured of a predictabl­e return on investment.

 ?? — Reuters ?? 5G will bridge wireless and wireline networks, forcing a major network architectu­ral change from radio access to core.
— Reuters 5G will bridge wireless and wireline networks, forcing a major network architectu­ral change from radio access to core.
 ??  ??

Newspapers in English

Newspapers from United Arab Emirates