...
Agenda and Minutes:
- Recording
- Anti-Trust Policies:
- Agenda Bashing
- Technical
- RM == > Due to the fact that there is no new profiles so the changes in RM will be minimal
- Start the Architecture (OS and K8s )
-
- CNTT Baraque
- Milestones
- May 29: M1 (Release Planning/Requirements)==> Done
- Jun 19: M2 (Issue Logging)==> Done
- Sep 14: M3 (Freeze contributions)
- Outlines and Roadmap items :
- Webinars:
-
- liaison
- Do we need it right now (Y/N)
- LF-Edge -akraino :
- OpenStack - StarlingX :
- GSMA -
- TIP : update , we have a meeting with TIP& FB
- O-RAN = WG 6
- Meeting Calendar (added by Pankaj)
Minutes:
Discussion of the pros and cons of centralized/decentralized deployment models. DCN (Distributed Compute Node), a form of centralized controller that is based on the Triple-O deployment model. No controller out at the edge, all management is handled in the centralized resources. karim Rabie presented a couple slides on the different options. If the controller and edge node is disconnected, how long will it take for the edge node will be affected. Would lose visibility of the edge node, also how often does the Edge node connect/communicate with the controller. Controller is providing NFVO integrating to the Openstack at the edge. Distributed control plan, StarlingX is an example. karim Rabiewill attach the file he showed during the meeting.
Open Infrastructure call for presentations closes August 4th: Register today for the virtual Open Infrastructure Summit on October 19-23 at no cost to you!
|
2020 Tracks: - 5G, NFV & Edge
- AI, Machine Learning & HPC
- CI/CD
- Container Infrastructure
- Getting Started
- Hands-on Workshops
- Open Development
- Private & Hybrid Cloud
- Public Cloud
- Security
|
|
Submit your presentations, panels, and workshops before August 4 at 11:59 pm PT (August 5 at 6:59 am UTC). The content submission process for the Forum and Project Teams Gathering (PTG) will be managed separately in the upcoming months. The Summit Programming Committee has shared topics by Track for community members interested in speaking at the upcoming Summit. Check out the submission tips! |
|
Discussion of Edge Security considerations. IMSI Catcher scenario (a variation of MITM vulnerability), Telco's asking for some form of validation to confirm that the node as not been taken over by an evil twin.
- Different Edge Architecture has been discussed
- Some limitation and consideration in Centralized control plan
- Work on Networking limitation & Consideration ( Ahmed El Sawaf Pankaj.Goyal Sukhdev Kapur)
- Security issue ( How to secure control plan) karim Rabielist some current issue
- karim Rabie Ahmed El Sawaf PROS & CONS for each Arch
...