ETSI NFV ISG is in the final stage of publishing all of its Release 2 Specifications and Reports. This webinar highlights some of the fantastic Release 2 results and introduces the upcoming Release 3 work program.
Watch this webinar to get the most up-to-date plans from the NFV community and see what's coming up on the horizon.
The speaker is Thinh Nguyenphu, NFV Architect at Nokia Bell Labs. Thinh is chairman of the ETSI NFV ISG Evolution and Ecosystem Working Group (EVE WG) and vice-chairman of the Solution WG, and member of the NFV Technical Steering Committee.
RecordedJul 12 201657 mins
Your place is confirmed, we'll send you email reminders
Several high level speakers from various sectors in the ecosystem.
We are entering an exciting new era of communications, and fixed networks play an essential role in that evolution alongside and in cooperation with mobile networks. Our speakers will guide you through the challenges and opportunities of ubiquitous fibre connections and will share with us why they joined the new ETSI F5G Industry Specification Group. The ETSI F5G group aims at bringing a new communication experience for homes, industries and smart cities leading to a better digital future through a full-fibre world.
As 5G roll-outs take off, enabling a variety of new applications and services running at the network Edge plays an essential role in establishing new business models and revenue streams. Digital transformation becomes a pre-requisite for the 5G networks offering automation, zero-touch management and orchestration of not only the necessary resources and connectivity needed for edge computing and of the edge computing platforms offered, but also the applications running at the edge.
Multi-vendor deployments require interoperability, enabled by the current standardization work support as well as its further evolution in support of emerging business models and their required deployment models. Standards Developing Organizations such as ETSI NFV, ETSI ZSM as well as 3GPP and open source initiatives are building blocks for multi-vendor deployments and for rapidly adding new edge applications and services.
Diego R. Lopez, Senior Technology Expert at Telefonica I+D, chair ETSI ISGs NFV and PDL
The most promising use cases for edge computing, related to demanding network features and scenarios like industrial IoT, require to go beyond current network services, and support a much more dynamic way of consuming them.
The traditional borders between local and wide area networks, between network segments, and between application and network services themselves tend to blur into a continuum of network services supporting user applications.
Techniques like the emerging In-Network Computing paradigm require multi-dimensional openness (among computing environments, across network segments, along geographical areas and operators…) and have to rely on holistic network orchestration to achieve the promise of an elastic edge.
This session, the 2nd of a 2 part webinar will provide a deep dive on how to deploy Cloud Native Network Functions on Kubernetes with OSM, using either helm charts or Juju bundles and how to benefit from the new automatic placement feature in OSM for edge deployments.
Francisco Javier Ramon Salguero, ETSI OSM Chair, Gianpietro Lavado, WhiteStack and Francisco Rodríguez, Indra.
This session, the 1st of a 2 part webinar, will give you an overview of Open Source MANO, the main highlights in Release SEVEN, how to achieve full life cycle automation of real network services and how to enable self-monitoring of OSM components on Kubernetes.
The pivotal deployment of 5G and network slicing has triggered the need for a radical change in the way networks and services are managed and orchestrated. Full end-to-end automation of network and service management has become an urgent necessity for delivering services with agility and speed and ensuring the economic sustainability of the very diverse set of services offered by Digital Service Providers. The ultimate automation target is to enable largely autonomous networks which will be driven by high-level policies and rules (AKA intent); these networks will be capable of self-configuration, self-monitoring, self-healing and self-optimization without further human intervention. All this requires a new flexible end-to-end architecture framework designed for closed-loop automation and optimized for data-driven machine learning and artificial intelligence algorithms.
The ETSI ISG ZSM was formed with the goal to accelerate the definition of the required end-to-end architecture, and the presenter will introduce the ETSI ZSM architecture that was published on August 2019.
The ETSI Technical Committee on cybersecurity published the first globally applicable standard for consumer IoT security, ETSI TS 103 645, in February 2019. The standard will soon become a European standard (EN). This standard has also inspired the development of a test specification. This webinar will go over the 13 key areas which establish a security baseline for internet-connected consumer products and could provide the basis for future IoT certification schemes.
This webinar will provide an update of the latest activities of the ETSI Technical Committee Electronic Signatures and Infrastructures to provide a standardization framework for trust services.
It will cover digital signatures formats and procedures and policies for their creation and validation; policy, security and technical requirements for trust service providers (TSP) such as certification authorities, time-stamping authorities, TSP providing remote signature creation or validation functions, registered e-delivery providers, and long-term data preservation providers. It will also address Trusted Lists that enhance the confidence of parties relying on certificates or other services related to digital signatures by indicating whether a given TSP was operating under the approval of any recognized scheme.
Hosted by the Chairman of TC CYBER, which is the most security-focused Technical Committee in ETSI, this webinar will cover work, standards and developments in cybersecurity eco-system. It will address protection of personal data and communications, IoT security and privacy, cybersecurity for critical infrastructures, enterprise and individual cybersecurity, cybersecurity tools to support government activities, forensic activities, direct support to EU Legislation and the Quantum-Safe Cryptography working group.
Dario Sabella, ETSI MEC Vice-Chair, Sami Kekki, ETSI MEC Vice-Chair and Walter Featherstone ETSI MEC DECODE Working Group Cha
The webinar will provide a guidance for software developers on how to properly approach architecting and developing applications with components that will run in edge clouds, such as those compliant with ETSI’s MEC standards.
This webinar will also offer a live demo on how to use APIs, as suitable tools to use MEC technology, they will also be showcased at the forthcoming MEC Hackathon in September.
Jean-Yves Monfort, Vice Chair of the ETSI Committee USER, and Noemie Simoni, expert in the comittee.
Two experts from the ETSI Special Committee USER, will present results of their work on future solutions for a new role of users and consequently providers. This presentation, based on the results of two surveys and the analysis of several use cases, introduces a generic model for this new approach. The webinar also introduces the concepts of composition of services and of “as a service”, including the definition of profiles. A special attention has been drawn on security, data protection, privacy and Quality of Experience.
Mark Pecen, CEO of Approach Infinity, Inc., Chairman of TC CYBER Working Group Quantum Safe Cryptography
Quantum computing will break today’s public key cryptography standards that we use to secure communications today. The ETSI Quantum-Safe Cryptography (QSC) working group is publishing standards that will secure data in a world where quantum computers exist. This webinar will cover the basics of what quantum computing is, how it works and its impacts on currently-used security practices and cryptography. We’ll then cover the industry response to quantum-based security threats and present the landscape of quantum-safe security mechanisms.
François Ambrosini, Security and Data Protection Expert, IBIT Ambrosini UG; Christoph Striecks, Cryptographic Researcher, Aus
Attribute Based Encryption (ABE) bundles strong confidentiality with very flexible access control policies. Here, we present the ABE toolkit developed in ETSI TC CYBER through the standards ETSI TS 103 458 and ETSI TS 103 532. This webinar will introduce the challenges related to access control and protection of personal data and describe the ABE toolkit in detail. It will also provide real-world scenarios as example and an outlook on future developments of the toolkit.
Tony Rutkowski, Center for Internet Security, Daniel Powell, NCSC, Steve Fenter, Enterprise Data Center Operators & US Bank,
ETSI's new Middlebox Security Protocol (MSP) standards describe a new approach to network security; using middleboxes for layered defence and for management of secure enterprise networks – without infringing user privacy. The MSP standards are designed to protect enterprise networks, facilitating secure management and vital network operations, whilst giving control of user data back to the user.
This webinar will describe use cases for MSP, outline projects from the hackathon held on 13 June 2018 and explain the standard for implementers.
Alex Leadbeater, Head of Global Obligations Futures and Standards, BT Security, Chairman of TC CYBER
Hosted by the Chairman of TC CYBER, which is the most security-focused Technical Committee in ETSI, this webinar will cover work, standards and developments in cyber security eco-system. It will address protection of personal data and communications, IoT security and privacy, cyber security for critical infrastructures, enterprise and individual cyber security, cyber security tools to support government activities, forensic activities, direct support to EU Legislation and the Quantum-Safe Cryptography working group.
Sami Kekki, Huawei and Fabio Giust, Athonet, active participants of the ETSI MEC ISG.
ETSI ISG MEC is the home of MEC standards. ETSI MEC has developed a flexible API framework for multi-access networks that can be deployed not only in 5G systems but in current 4G systems. MEC specifications support the transition from 4G to 5G, by enhancing the capabilities of current systems with full forward compatibility with the next generation. This webinar will explain these concepts, illustrating a few deployment options of MEC in 4G. It will also describe its relation with the key elements and functionalities of the brand new 5G architecture and explain their collaborative interactions with MEC. The content of this webinar is supported by two recently published ETSI white papers, “MEC Deployments in 4G and Evolution Towards 5G” and “MEC in 5G networks.”
Alex Reznik, HPE, chair of ETSI MEC. Dario Sabella, Intel, secretary of ETSI MEC, Dirk Lindemeier, Nokia
Multi-access Edge Computing (MEC) is one of the key building blocks of 5G and a market driver for current 4G networks. After a short introduction to MEC, this webinar will bring you through ETSI MEC progress and how the industry is using it to build actual commercial products, based on Nokia use case. We will also share how ETSI drives activities to help accelerate market adoption through hackathons, Proofs of Concepts, best practice and informative white papers.
Dr. Markus Mueck, Intel, Chairman of ETSI’s technical committee for Reconfigurable Radio Systems (TC RRS).
Software radio reconfiguration offers solutions to recurring issues when linking hardware radio systems with software, allowing the upgrade and patching of radio systems deployed in the field. However, software radio systems must address a number of issues:
• How to transfer and install radio software components in a secure way
• How to provide access to new software components to a user/operator
• How to deal with device certification and type approval issues when new radio software components can modify the radio behaviour of a device
• How to provide software portability and achieve efficient radio performance
• How to gradually evolve a system towards software reconfigurability
ETSI’s Software Radio Reconfiguration model provides a modular and scalable solution to the challenge of deploying and using software radio systems. The solution, described in a recent ETSI white paper and in the EN 303 146 series of European Standards, allows a gradual and stepwise deployment of software reconfigurable radio, through different generations of equipment. This enables device manufacturers to gradually implement software reconfigurable radios, developing confidence at each step of the way.
Dr. Markus Mueck, of Intel, is the chairman of ETSI’s technical committee for Reconfigurable Radio Systems (TC RRS). In this webinar, he will explain in more details the advantages of software radio reconfiguration, and explain how the ETSI Software Radio Reconfiguration model addresses each of the issues identified above.