Professional Documents
Culture Documents
TWICE
Physical Security
Mechanism(s) to ensure that Edge locations cannot be tampered with or that if they are, it will be rapidly
detected and appropriate automated and/or physical measures taken.
Information Security (and privacy)
Apply standard rules and procedures to define how information needs to handled when stored or in
transit at the edge, including addressing regulatory and privacy concerns
Software and configuration security
Secure logging mechanisms to control and monitor operations on remote edge nodes.
State of the art measures for authentication and ACL
Making the Edge Cloud easy to manage
Work for a unified, extensible and automated management approach
Performance Management is important for Edge nodes in terms of latency, capacity, reliability,
assurance. Privacy has specific requirements.
Agreed Performance Benchmarks (KPIs) that all can use and measure themselves against, such as
latency, throughput, round-trip time.
Agreed reference designs and/or capabilities that span Edge, Data Centers and the network connecting
them
Methods for managing across domains, across clouds and differentiating between tenants need to be
developed.
These cannot be done in isolation and need to work across vendors, or service providers.
* If MEC is installed in network edge data center in the one of transport network aggregation points, requirements are
the same as regular data center
Identify edge computing landscape what is currently
available in the market
Multi-Access Edge deployment locations per ETSI*
*ETSI MEC002 s4.4
BSS
Internet
Distant Cloud
GS NFV-PER001
OpenFog Reference Architecture
NFV performance and
portability best practices
Guidelines for ETSI OSM CORD Spec
implementation
On.Lab driven
Central Office as Edge
Multi-Access Edge Compute Standard Architecture
Application Application Application
VM VM VM
Virtualization Manager
MEC Application Platform
Hypervisor/MEC OS Layer
Applications
Operators Perspectives
Explore the benefits of using ETSI MEC APIs (focus on application developers)
Explore the manageability of MEC deployments by using MANO / NFV solution (also including interfaces with OSS
functions including NMS, Security and others)
Demonstrate mission critical application deployment and performance in edge cloud using MEC
In addition, explore the benefits and viability of sharing a common NFVI between MEC Server VNF and other
edge related VNFs, such as vEPC and vRAN
Explore the applicability of Licensed, Unlicensed and shared spectrum (LTE, LTE-LAA, MulteFire, WiFi) to MEC
Develop MEC Ecosystem and provide feedback on current gaps and potential solutions
MEC Architectures and Deployment Scenario
S1 Interface
SGi
Central Office
Application Developers Operator (OSS)
S1 S1
SGi
Mm3
Apps
Central Office
2. Explore the manageability of
Application Developers
MEC deployments by using Operator (OSS)
MANO solution Mobile Edge
Platform
3. Demonstrate mission critical Manager
application deployment and
performance in edge cloud ETSI MEC APIs
using MEC
Apps
Internet
S1 S1 SGi
Mm3
Apps
related VNFs, such as vEPC and
Central Office
vRAN
Application Developers
Or-Vnfm
Or-Vnfm
Operator (OSS)
2. Explore the applicability of Mobile Edge
Licensed, Unlicensed and shared Platform
Manager
(LTE, LTE-LAA, CBRS, MulteFire,
WiFi) spectrum use to MEC
ETSI MEC APIs VNF Managers
S1 S1 SGi