ETSI Multi-access Edge Computing builds on NFV and network slicing

The ETSI Multi-access Edge Computing Industry Specification Group is pleased to announce the release of two major reports as part of its Phase 2 work. The ETSI report GR MEC 027 studies the impact of alternative virtualisation technologies. The second report, ETSI GR MEC 024, examines network slicing on edge computing systems.

ETSI GR MEC 027, a report on alternative virtualisation technologies, identifies the additional support that needs to be provided when MEC applications run on containers. Building on related work developed by the ETSI NFV group, it defines the usage of such technologies in a MEC environment, the impact on implementation of MEC systems and applications and the potential updates of future ETSI MEC standards. The results and conclusion of this report highlight that most of the ETSI MEC specifications are virtualisation-technology agnostic; this leads to very few updates of existing standards.

Alex Reznik, Chair of the ETSI ISG MEC, said: “We know that non-VM based virtualisation is a key technology for edge computing. We therefore wanted to make sure that the ETSI MEC architectural framework is capable of supporting such technologies and that it is consistent with ETSI NFV. This report is the result of this analysis and the good news is ETSI MEC-defined APIs are almost entirely virtualisation technology agnostic. This highlights the quality and future proof of the APIs we’ve standardised in the group.”

ETSI GR MEC 024 identifies the MEC functionalities to support network slicing and the impact on future ETSI MEC specifications. It provides important use cases and examples of how network slicing may be addressed in edge computing systems. One of them includes the description, use case recommendations and evaluation of a network slice integrating MEC applications and using 3GPP elements. Other use cases address how you can have multiple tenants in a network slice or how efficient an end-to-end multi-slice support for MEC-enabled 5G deployments can be. Four network slicing concepts have been described and two prioritised for the time being.

Key existing specifications, namely ETSI GS MEC 011, GS MEC 010-2 and GS MEC 012, have also been updated. In the case of MEC 011 and MEC 012, these updates reflect the on-going evolution of ETSI MEC specifications. The updated MEC 010-2 introduces the first set of Stage 3 API specifications, building on the work of ETSI NFV SOL. The work to produce a full Stage 3 ETSI NFV SOL-consistent MEC 010-2 API continues and is expected to conclude by the end of this year.

For more security news visit here.

 

Georgina Turner image

Georgina Turner

Sales Manager

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

The Role of AI Gateway Devices

From the Expert – The Role of AI Gateway Devices

AI gateway devices bridge legacy security cameras and cloud platforms, enabling real-time analytics, hybrid storage, and compliance…
Cover Story - Empowering the Mobile Workforce with HID

Cover Story – Empowering the Mobile Workforce with HID

HID presents the latest in portable readers, depicting a modern world where secure access moves with you…
Frank Mueller headshot

How LiDAR protects railways

Frank Mueller, Hexagon, presents a thought leadership perspective of the use of LiDAR in railway infrastructure.
Image provided by Customs support group

Hello Post-Brexit Security Protocols

Jo Cloherty, Senior Commercial Manager at Customs Support Group, explores the 2025 Safety and Security Protocols that have…
Copyright: Security Buyer

Mind Games – The Psychological Perimeter

Joseph Clarke analyses how combining psychological deterrence with physical barriers, hidden detection, and forensic marking..
Image provided by ICT

ICT combines legacy and executive force

Integrated Control Technology (ICT) demonstrates the power of legacy and leadership in determining success and growth in industry  
Copyright: Security Buyer

Is Your Office Security Failing?

Unification and the user experience is transforming corporate security—enhancing access control, surveillance, and cybersecurity…
image provided by HID

HID Unveils OMNIKEY® SE Plug, Redefining Mobile Authentication

HID, a global leader in trusted identity and access control solutions, is proud to introduce the new OMNIKEY SE Plug reader…
Human oversight in the age of AI security image - Security Buyer

Human oversight in the age of AI security

Alex Kazerani, SVP of Cloud Video Security & Access Control, Motorola Solutions explores the power of AI in video security.
Graphic displaying a lockdown solution

Netgenium debuts next gen display and touchscreen technologies

Power-over-Ethernet (PoE) solutions specialist Netgenium will be showcasing its new range of IP…
Scroll to Top