Software-defined video production – Utilizing Public 5G Networks for Multi-Access Edge (MEC) Architectures

The sports industry is always looking for ways to reduce video delays to improve the experience for viewers, fans, and players. 5G networks offer a solution with the capability to deliver high bandwidth and reliability, as outlined next: Mixing: combining various audio and video sources to produce a cohesive program output. Traditionally, large and complex […]

Continue

Security – Utilizing Public 5G Networks for Multi-Access Edge (MEC) Architectures

Security has been a perennial concern for Wi-Fi. Early encryption methods such as Wired Equivalent Privacy (WEP) were quickly found to be vulnerable. While the subsequent WPA and WPA2 protocols offered enhanced security, they were not impervious to breaches. The introduction of WPA3 has aimed to address earlier vulnerabilities. However, Wi-Fi often remains susceptible to […]

Continue

Private MEC – Utilizing Public 5G Networks for Multi-Access Edge (MEC) Architectures

Some customers wish to build their own private 5G networks and offer MEC to their customers only. Often, these customers are subordinate companies of an overarching conglomerate, or sometimes they are public sector entities. For instance, the State of California might decide to offer MEC services only to county- or municipal-level entities within certain geographies: […]

Continue

Overview of architecting 5G-based MEC solutions – Utilizing Public 5G Networks for Multi-Access Edge (MEC) Architectures

As you’ll recall from Chapter 2, Multi-Access Edge Computing (MEC) refers to architectures that exploit the opportunity presented by the convergence of two forces in 5G architecture. First is the prevalence of Network Functions Virtualization (NFV) on commodity server hardware. Second is the fact that the User Plane Function (UPF) is distributed at the edge […]

Continue

EKS-A container networking interfaces (CNIs) – Architecting for Disconnected Edge Computing Scenarios

Because disconnected environments do not participate in the network virtualization stack backing in-region VPC services, the VPC-CNI plugin is not available. Instead, EKS-A offers a choice of Cilium or Kindnet for container networking. Only one can be selected at deployment time, and it cannot be changed after deployment: Figure 9.16 – EKS-A encapsulating IP flows […]

Continue