5G, a Game-changer in Telecommunication Sector
The 5G-fueled digital transformation is a massive weapon to pave a path for attaining socio-economic transformation.
FREMONT, CA: The telecommunication sector is transforming quickly on an unprecedented scale, with digitization becoming a critical concern driving the worldwide networked economy. For instance, end-to-end 5G network slicing is pledged to be an increasing component of that transition, but mobile telecom service suppliers need to alter all elements of their company before they deal with it.
ABI Research has predicted that network slicing will generate a value of approximately $66 billion for vertical companies, including manufacturing, logistics, and transport by 2026. 5G network slicing is intended to serve as a stepping stone to drive productivity growth and allow high-performance connectivity underpinning the vibrant, safe, and reliable interconnection between industrial devices and equipment.
The telecommunications network finally makes a similar transition with 5G. Functions served by 4G purpose-built nodes were abstracted as VNFs revealing open APIs-3GPP running in a cloud. Interestingly, over generations of wireless networks, the protocol layers engaged in some of the control tasks have now altered.
In the case of 5G, mobility management is accomplished by a service-consuming VNF over HTTP instead of signaling/control emails, which then passes over a TCP session to a peer service-producing VNF. To be reasonable, a protocol stack consisting of HTTP at the top of TCP/IP is still being traversed. It is worth noting that the 5 G VNF API calls may cross government networks, and this needs extra safety factors. This is where the function of the Security Edge Protection Proxy (SEPP) plays a significant part in ensuring communication between the VNF customer and the VNF producer.
Mobile operators can now, however, use the security software that has been in place for years to safeguard business applications such as firewalls, SSL intercept, and DDoS protection to tackle security vulnerabilities in 5G networks.
By Tom Farrah, CIO & SVP, Dr Pepper Snapple Group
By George Evans, CIO, Singing River Health System
By John Kamin, EVP and CIO, Old National Bancorp
By Phil Jordan, CIO, Telefonica
By Elliot Garbus, VP-IoT Solutions Group & GM-Automotive...
By Dennis Hodges, CIO, Inteva Products
By Bill Krivoshik, SVP & CIO, Time Warner Inc.
By Gregory Morrison, SVP & CIO, Cox Enterprises
By Alberto Ruocco, CIO, American Electric Power
By Sam Lamonica, CIO & VP Information Systems, Rosendin...
By Sven Gerjets, SVP-IT, DIRECTV
By Marie Blake, EVP & CCO, BankUnited
By Lowell Gilvin, Chief Process Officer, Jabil
By Walter Carvalho, VP & Corporate CIO, Carnival Corporation
By Mary Alice Annecharico, SVP & CIO, Henry Ford Health System
By Bernd Schlotter, President of Services, Unify
By Bob Fecteau, CIO, SAIC
By Jason Alan Snyder, CTO, Momentum Worldwide
By Jim Whitehurst, CEO, Red Hat
By Marc Jones, Distinguished Engineer, IBM Cloud Infrastructure