Author Archive

Posted on

Unleashing 5G Network Performance with Next Generation Ethernet

By Alik Fishman, Director of Product Management, Marvell

Blink your eyes. That’s how fast data will travel from your future 5G-enabled device, over the network to a server and back. Like Formula 1 racing cars needing special tracks for optimal performance, 5G requires agile networking transport infrastructure to unleash its full potential. The 5G radio access network (RAN) requires not only base stations with higher throughputs and soaring speeds but also an advanced transport network, capable of securely delivering fast response times to mobile end points, whatever those might be: phones, cars or IoT devices. Radio site densification and Massive Machine-type Communication (mMTC) technology are rapidly scaling the mobile network to support billions of end devices1, amplifying the key role of network transport to enable instant and reliable connectivity.

With Ethernet being adopted as the most efficient transport technology, carrier routers and switches are tasked to support a variety of use cases over shared infrastructure, driving the growth in Ethernet gear installations. In traditional cellular networks, baseband and radio resources were co-located and dedicated at each cell site. This created significant challenges to support growth and shifts in traffic patterns with available capacity. With the emergence of more flexible centralized architectures such as C-RAN, baseband processing resources are pooled in base station hubs called central units (CUs) and distributed units (DUs) and dynamically shared with remote radio units (RUs). This creates even larger concentrations of traffic to be moved to and from these hubs over the network transport.

(more…)

Posted on

Living on the Network Edge: Security

By Alik Fishman, Director of Product Management, Marvell

Living on the Network Edge: Security

In our series Living on the Network Edge, we have looked at the trends driving Intelligence, Performance and Telemetry to the network edge. In this installment, let’s look at the changing role of network security and the ways integrating security capabilities in network access can assist in effectively streamlining policy enforcement, protection, and remediation across the infrastructure.

Cybersecurity threats are now a daily struggle for businesses experiencing a huge increase in hacked and breached data from sources increasingly common in the workplace like mobile and IoT devices. Not only are the number of security breaches going up, they are also increasing in severity and duration, with the average lifecycle from breach to containment lasting nearly a year1 and presenting expensive operational challenges. With the digital transformation and emerging technology landscape (remote access, cloud-native models, proliferation of IoT devices, etc.) dramatically impacting networking architectures and operations, new security risks are introduced. To address this, enterprise infrastructure is on the verge of a remarkable change, elevating network intelligence, performance, visibility and security2.

(more…)