Security – Utilizing Public 5G Networks for Multi-Access Edge (MEC) Architectures

Security has been a perennial concern for Wi-Fi. Early encryption methods such as Wired Equivalent Privacy (WEP) were quickly found to be vulnerable. While the subsequent WPA and WPA2 protocols offered enhanced security, they were not impervious to breaches. The introduction of WPA3 has aimed to address earlier vulnerabilities. However, Wi-Fi often remains susceptible to […]

Continue

Private MEC – Utilizing Public 5G Networks for Multi-Access Edge (MEC) Architectures

Some customers wish to build their own private 5G networks and offer MEC to their customers only. Often, these customers are subordinate companies of an overarching conglomerate, or sometimes they are public sector entities. For instance, the State of California might decide to offer MEC services only to county- or municipal-level entities within certain geographies: […]

Continue

Overview of architecting 5G-based MEC solutions – Utilizing Public 5G Networks for Multi-Access Edge (MEC) Architectures

As you’ll recall from Chapter 2, Multi-Access Edge Computing (MEC) refers to architectures that exploit the opportunity presented by the convergence of two forces in 5G architecture. First is the prevalence of Network Functions Virtualization (NFV) on commodity server hardware. Second is the fact that the User Plane Function (UPF) is distributed at the edge […]

Continue

EKS-A container networking interfaces (CNIs) – Architecting for Disconnected Edge Computing Scenarios

Because disconnected environments do not participate in the network virtualization stack backing in-region VPC services, the VPC-CNI plugin is not available. Instead, EKS-A offers a choice of Cilium or Kindnet for container networking. Only one can be selected at deployment time, and it cannot be changed after deployment: Figure 9.16 – EKS-A encapsulating IP flows […]

Continue

Forward deployment of the AWS Snow family –Architecting for Disconnected Edge Computing Scenarios

Commanders need flexible, rugged compute horsepower that can be quickly deployed or torn down and moved. From an off-the-shelf server’s point of view, forward-deployed Command Posts (CPs) operate under less-than-ideal circumstances. Sometimes, they are semi-permanent structures that have HVAC, but even then, it is limited. CPs rarely meet the environmental requirements of the average rackmount […]

Continue