From the course: Implementing Zero Trust for 5G and Open RAN
Unlock this course with a free trial
Join today to access over 24,600 courses taught by industry experts.
User and access
From the course: Implementing Zero Trust for 5G and Open RAN
User and access
- [Instructor] Imagine a world where billions of devices connect seamlessly to power smart cities, autonomous vehicles, and real-time healthcare. Yes, this is the promise of 5G. So it's all starts with identifying the use cases. The first use case that I want to talk you through is for the UE and for the access network. If you look at the reference architecture, there are mobile clients and IoT on the left hand side, which are the end user's accessibility, and then the requests from all those devices are coming to the radio units, as well as to the Open RAN components. Now, what you need to understand, if you look at the policy enforcement points and policy determination points, that should be all well synced in all these components. For example, you can have policy enforcements points for the mobile communication towards radio units. How do you implement this? You'll use SUCI for this, which is encrypting the traffic which is coming from the UI towards the radio units. As well as you…
Contents
-
-
-
-
-
-
(Locked)
Zero trust policy management3m 53s
-
(Locked)
User and access4m 38s
-
(Locked)
Management and data zone2m 59s
-
(Locked)
Network function virtualization2m 9s
-
(Locked)
Network slice, applications, and service3m 22s
-
(Locked)
Transport zone2m 11s
-
(Locked)
Challenge: PDP and PEP matrix25s
-
(Locked)
Solution: PDP and PEP matrix2m 25s
-
(Locked)
-
-