I'm doing quite a fair bit in 5G IP Core transport portion. After watching this presentation helped me to understand much better in the 5GC portions. Thanks
What is with all of the lunatics in the comments. Excellent presentation, I am glad I finally stumbled upon this having spent quite a lot of time working in IMS and starting to learn about the EPS access network
About the security between Core Networks and Access networks(5GC -- RAN), (1) How a secure session is created? What do security needs - integrity & authentication only? (2) Does it use IPsec or DTLS? (3) Does the security session has a time latency limit? (4) What is the capacity of the devices used to create the secure session ?About the security between Core Networks and Access networks(5GC -- RAN), (1) How a secure session is created? What do security needs - integrity & authentication only? (2) Does it use IPsec or DTLS? (3) Does the security session has a time latency limit? (4) What is the capacity of the devices used to create the secure session ?
this technology hasnt even be accesed in safety trails by third party regulators. PLS show me a paper posted independently stating millimetre waves are safe to living organisms
First, if you don't understand what the words mean then this presentation isn't meant for you. Second, I think he does a great job of generally avoiding the abbreviations
I'm doing quite a fair bit in 5G IP Core transport portion. After watching this presentation helped me to understand much better in the 5GC portions. Thanks
First class presentation. Thumbs up!
Valuable information and well presented. Thanks!
What is with all of the lunatics in the comments. Excellent presentation, I am glad I finally stumbled upon this having spent quite a lot of time working in IMS and starting to learn about the EPS access network
About the security between Core Networks and Access networks(5GC -- RAN), (1) How a secure session is created? What do security needs - integrity & authentication only? (2) Does it use IPsec or DTLS? (3) Does the security session has a time latency limit? (4) What is the capacity of the devices used to create the secure session ?About the security between Core Networks and Access networks(5GC -- RAN), (1) How a secure session is created? What do security needs - integrity & authentication only? (2) Does it use IPsec or DTLS? (3) Does the security session has a time latency limit? (4) What is the capacity of the devices used to create the secure session ?
10 out of 10. Excellent presentation 👏
Haters will always do thumbs down, because they think they know better,
Very nice presentation !! thank you !
Nice Presentation! Thank you!
Hello everyone, great presentation.
Anywway, is there any chance that I can get the transcript of this talk? Thank you!
Wow~. I have learned a lot from watching this presentation.
Thanks for sharing Martin
What is the centralized aggregation site? Will these be existing cell towers?
Congratulations! Thumbs up!
Does anyone know what IPP stand for?
Thanks. Any way we can access the Other Presentations at IET 2018 Turing ? Pls share the Link
blog.3g4g.co.uk/2018/01/5g-network-architecture-design-and.html
Loise Niita Ashivudhi b
Thanks a lot for the presentation. Is there a way to get slides presented here?
www.slideshare.net/3G4GLtd/5g-network-architecture-design-and-optimisation
Hello,
Slides can be downloaded from here: www.slideshare.net/3G4GLtd/5g-network-architecture-design-and-optimisation - Best regards...
9:27 can someone help finding the huawei presentation?
Very good presentation
this technology hasnt even be accesed in safety trails by third party regulators. PLS show me a paper posted independently stating millimetre waves are safe to living organisms
M(x,y)dx+N(x,y)dy=0
dy/dx=f(x)
Why is it acceptable to give talks which are completely saturated with esoteric buzzwords?
First, if you don't understand what the words mean then this presentation isn't meant for you. Second, I think he does a great job of generally avoiding the abbreviations