For 5G to reach its full potential, computing at the edge of the network is essential. However, edge computing challenges data centers – a distributed network inherently has more vulnerabilities. Network resilience is therefore becoming the focus.
5G, with its significantly higher speeds combined with extremely fast response times, is considered a key technology for new usage scenarios. However, speed and intelligence require the interaction of many different components. As a result, network operators and companies that want to set up their own local 5G networks are faced with significantly more complex systems. One reason for this lies in the introduction of virtualized network infrastructures: This “network functions virtualization” is the fastest way to implement new services for companies and entire industries, to customize them and scale them as needed.
This ranges from smart factories and automated production lines to the use of robots, for example in health care and virtual or augmented reality scenarios, to autonomous vehicles. The new application possibilities mean that carriers and companies will have to manage an increasing number of business-critical systems and devices as well as huge amounts of sensitive data in the future. This in turn not only requires that these are almost fail-safe and available in an extremely short time, but also significantly increases the security requirements for the networks. that carriers and companies will have to manage an increasing number of business-critical systems and devices as well as huge amounts of sensitive data in the future.
This in turn not only requires that these are almost fail-safe and available in an extremely short time, but also significantly increases the security requirements for the networks. that carriers and companies will have to manage an increasing number of business-critical systems and devices as well as huge amounts of sensitive data in the future. This in turn not only requires that these are almost fail-safe and available in an extremely short time, but also significantly increases the security requirements for the networks.
With edge computing, the infrastructure moves to the edge
Another important aspect is the use of edge computing, including with regard to the topic of “real-time data”. Processing data with real-time systems brings computation, storage and analysis physically closer to where they are actually needed. In addition to the shortened response times and the solved latency problems, this enables immediate use of the data. The following applies: Edge computing and 5G cannot do without each other, at the same time they require a realignment of the data center infrastructure. In addition to large, centrally working locations, small data centers “on the edge”, which are set up closer to the user and thus enable localized digital services, will play an increasingly important role in the future.
At first glance, these specialized data centers may appear to be a simple solution. Like any other data center, however, they have to meet the highest requirements. And that not only requires speed, but also resilience and security – including comprehensive management and monitoring tools. The reality is different: in order to prevent complete IT failure after a successful cyber attack, for example, shutting down the entire network is usually the only way to prevent ransomware from penetrating further. With intelligent out-of-band management (OOB), this would not be absolutely necessary. The network could be taken offline at short notice. During this time, the experts would have the opportunity to determine remotely which specific devices are targeted by the ransomware and then keep them completely isolated. On the other hand, all unaffected parts of the network could be put back into operation in order to get at least a partial network up and running and thus ensure business operations.
Also Read: 5G And “Environmental” Communications