Security – Utilizing Public 5G Networks for Multi-Access Edge (MEC) Architectures

Security has been a perennial concern for Wi-Fi. Early encryption methods such as Wired Equivalent Privacy (WEP) were quickly found to be vulnerable. While the subsequent WPA and WPA2 protocols offered enhanced security, they were not impervious to breaches. The introduction of WPA3 has aimed to address earlier vulnerabilities. However, Wi-Fi often remains susceptible to […]

Continue

Overview of architecting 5G-based MEC solutions – Utilizing Public 5G Networks for Multi-Access Edge (MEC) Architectures

As you’ll recall from Chapter 2, Multi-Access Edge Computing (MEC) refers to architectures that exploit the opportunity presented by the convergence of two forces in 5G architecture. First is the prevalence of Network Functions Virtualization (NFV) on commodity server hardware. Second is the fact that the User Plane Function (UPF) is distributed at the edge […]

Continue

EKS-A container networking interfaces (CNIs) – Architecting for Disconnected Edge Computing Scenarios

Because disconnected environments do not participate in the network virtualization stack backing in-region VPC services, the VPC-CNI plugin is not available. Instead, EKS-A offers a choice of Cilium or Kindnet for container networking. Only one can be selected at deployment time, and it cannot be changed after deployment: Figure 9.16 – EKS-A encapsulating IP flows […]

Continue

Forward deployment of the AWS Snow family –Architecting for Disconnected Edge Computing Scenarios

Commanders need flexible, rugged compute horsepower that can be quickly deployed or torn down and moved. From an off-the-shelf server’s point of view, forward-deployed Command Posts (CPs) operate under less-than-ideal circumstances. Sometimes, they are semi-permanent structures that have HVAC, but even then, it is limited. CPs rarely meet the environmental requirements of the average rackmount […]

Continue